SlideShare a Scribd company logo
COMPUTER VOCABULARY

Match the following concepts with their corresponding definitions. Write the number you deem more
appropriate in the right column.

1. Adware

It is a small piece of information on the times and dates you have visited
web sites. A web server can temporarily store this information within your
browser. The main purpose of cookies is to identify users and possibly
prepare customized web pages for them.

2. Application

Frequently asked questions

3. E-mail

A program or tool such as Internet Explorer or Mozilla Firefox that
enables you to browse or surf the World Wide Web and view internet
sites.

4. Bug

A particular kind of lettering (for example: Arial, Bookman, Times New
Roman).

5. Cache

It is any program designed to perform a specific function directly for the
user. OpenOffice Writer, Gimp, Windows Media Player are examples of
application programs

6. Cookies

A software application which displays unwanted pop-up advertisements
on your computer while in use. Adware is often installed on your
computer at the same time as free software or shareware.

7. Crash

A defect or fault in a computer program that prevents it from working
correctly. Bugs are caused by mistakes or errors made by the people who
write the program.

8. Cursor

In computing, it is what happens when a program, or the entire operating
system, unexpectedly stops working.

9. Driver

A blinking symbol on the screen that shows where any new text will next
be entered.

10. Home Page

Business done over the internet or any internet-based network.

11. Browser

Electronic mail: messages sent from one computer to another over the
Internet.

Page 1 / 3
12. FAQ

A sort of fast memory used for temporary storage of recently accessed
web pages, which enables the browser to display them more quickly on
the next visit.

13. Hardware

Specialized hardware or software designed to prevent unrestricted or
unauthorized access into or out of a computer or network.

14. Font

A special program which enables a computer to work with a particular
piece of hardware such as a printer.

15. Firewall

The physical equipment or touchable parts of a computer system, the CPU
(central processing unit), the monitor, the keyboard, the mouse, the
external speakers, the scanner, the printer, etc.

16. Hit

A visit to a website.

17. E-business

The main page or opening page that appears when you visit a web site. It
usually contains links to the other pages.

18. Login

Unwanted, irrelevant or inappropriate e-mail messages, especially
commercial advertising. Also referred to as "junk e-mail".

19. Portal

A device that enables a computer to send and receive information over a
telephone line. You need a modem to connect to the Internet, to send
email and to fax.

20. Program

Network etiquette: a set of informal rules defining proper behaviour on the
Internet.

21. Modem

A website that acts as a gateway or entry point to the internet (for
example, Yahoo). Typically, a portal offers a search engine and links to
other sites grouped into categories, as well as news or other services.

22. Netiquette

A sequence of instructions that a computer can interpret and execute in
order to do a particular job. Programs are collectively referred to as
"software".

23. Provider

World Wide Web: A hypertext information system consisting of a
network of web pages which runs on the Internet and can be accessed with
a browser.

Page 2 / 3
24. Scanner

It is a malicious self-replicating program that spreads by inserting copies
of itself into other executable code or documents, and whose sole intent is
to cause problems on a computer. It acts in a way similar to a biological
virus, and the infected file is called a host.

25. Spam

A piece of hardware, or peripheral device, used to scan a document and
create a digital copy.

26. Spyware

Process by which a user enters a name and password to access a computer.

27. Trojan

Software that collects information, without your knowledge, about your
web-surfing. habits and uses it for marketing purposes.
Very often contained in free downloads or shareware programs.

28.
Videoconference

What you see is what you get. (pronounced 'wizzy-wig'). A WYSIWYG
application enables you to see on the screen exactly what will appear
when the document is printed.

29. Virus

It is a computer program that is hidden in a useful software application
and actually used to gain access to your computer. It then performs
malicious actions such as displaying messages or erasing files. Trojans
may be found in a hacked legitimate program or in free software.

30. WYSIWYG

Interactive, audiovisual meeting between two or more people in different
geographic locations using two-way video technology.

31. WWW

Company that provides access to the Internet.

32. Worm

To zip a file is to compress it so that it occupies less space in storage and
can be transferred quickly over the Internet.

33. Zip

It is a self-replicating computer program, similar to a computer virus. It
infects additional computers (typically by making use of network
connections), often clogging networks and information systems as it
spreads.

Page 3 / 3

More Related Content

What's hot

Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
fidel barrios
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus
VirusVirus
Virus
CHITRA S
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
Sameep Sood
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
Margus Meigo
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
BikashPayeng
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 

What's hot (20)

Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Malware
MalwareMalware
Malware
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malware and security
Malware and securityMalware and security
Malware and security
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
M
MM
M
 

Viewers also liked

Parts of a computer crossword: Computer Science
Parts of a computer crossword: Computer ScienceParts of a computer crossword: Computer Science
Parts of a computer crossword: Computer Science
nicamos
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activityshidabahri
 
Input Devices Crossword Puzzle
Input Devices Crossword PuzzleInput Devices Crossword Puzzle
Input Devices Crossword PuzzleBiscette InfoTech
 
Clil lesson plan
Clil lesson planClil lesson plan
Clil lesson plan
Patricia Garces
 
Didactic Unit Hardware
Didactic Unit Hardware Didactic Unit Hardware
Didactic Unit Hardware
nicamos
 
Clil Lesson - Topic : Creative Commons Licenses
Clil Lesson - Topic : Creative Commons Licenses Clil Lesson - Topic : Creative Commons Licenses
Clil Lesson - Topic : Creative Commons Licenses
Daniel Pastor Peidro
 
Lesson template CLIL
Lesson template CLIL Lesson template CLIL
Lesson template CLIL
Alvaro Anton Perez
 
CLIL Unit: Computer networks and internet
CLIL Unit: Computer networks and internet CLIL Unit: Computer networks and internet
CLIL Unit: Computer networks and internet
javierjimenezramos
 
Crossword Puzzle 18x18
Crossword Puzzle 18x18Crossword Puzzle 18x18
Crossword Puzzle 18x18Office
 
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...Tu Instituto Online
 
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la información
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la informaciónSist. operat. y seg. informática. 4º eso. 03. la sociedad de la información
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la informaciónTu Instituto Online
 
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higiene
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higieneSist. operat. y seg. informática. 4º eso. 02. seguridad e higiene
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higieneTu Instituto Online
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
Biscette InfoTech
 
Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)
Biscette InfoTech
 
Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5cikgushaharizan
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functionsEmily-scamell
 
Hardware CLIL
Hardware CLILHardware CLIL
Hardware CLIL
constanrodenas
 
Actividades y tareas en CLIL y TIC
Actividades y tareas en CLIL y TICActividades y tareas en CLIL y TIC
Actividades y tareas en CLIL y TICisaperez
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
Cisco Mobility
 

Viewers also liked (20)

Parts of a computer crossword: Computer Science
Parts of a computer crossword: Computer ScienceParts of a computer crossword: Computer Science
Parts of a computer crossword: Computer Science
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activity
 
Input Devices Crossword Puzzle
Input Devices Crossword PuzzleInput Devices Crossword Puzzle
Input Devices Crossword Puzzle
 
Clil lesson plan
Clil lesson planClil lesson plan
Clil lesson plan
 
Didactic Unit Hardware
Didactic Unit Hardware Didactic Unit Hardware
Didactic Unit Hardware
 
Clil Lesson - Topic : Creative Commons Licenses
Clil Lesson - Topic : Creative Commons Licenses Clil Lesson - Topic : Creative Commons Licenses
Clil Lesson - Topic : Creative Commons Licenses
 
Lesson template CLIL
Lesson template CLIL Lesson template CLIL
Lesson template CLIL
 
CLIL Unit: Computer networks and internet
CLIL Unit: Computer networks and internet CLIL Unit: Computer networks and internet
CLIL Unit: Computer networks and internet
 
Crossword Puzzle 18x18
Crossword Puzzle 18x18Crossword Puzzle 18x18
Crossword Puzzle 18x18
 
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...
Sist. operat. y seg. informática. 4º eso. 01. historia y evolución de la info...
 
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la información
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la informaciónSist. operat. y seg. informática. 4º eso. 03. la sociedad de la información
Sist. operat. y seg. informática. 4º eso. 03. la sociedad de la información
 
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higiene
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higieneSist. operat. y seg. informática. 4º eso. 02. seguridad e higiene
Sist. operat. y seg. informática. 4º eso. 02. seguridad e higiene
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
 
Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)Output Devices In-Class Worksheet (Med)
Output Devices In-Class Worksheet (Med)
 
Worksheet2
Worksheet2Worksheet2
Worksheet2
 
Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Hardware CLIL
Hardware CLILHardware CLIL
Hardware CLIL
 
Actividades y tareas en CLIL y TIC
Actividades y tareas en CLIL y TICActividades y tareas en CLIL y TIC
Actividades y tareas en CLIL y TIC
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 

Similar to Vocabulary link: Computer Science

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
Rodz Tech
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Malware
MalwareMalware
Malware
Jason Quinlan
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
DarshanPadmapriya
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
QondileRamokgadi
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
LisleySebumpan
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Digital literacy review
Digital literacy reviewDigital literacy review
Digital literacy review
shemwilliams
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
SdhrYdv1
 

Similar to Vocabulary link: Computer Science (20)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
Internet security
Internet securityInternet security
Internet security
 
Malware
MalwareMalware
Malware
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Spyware
SpywareSpyware
Spyware
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Digital literacy review
Digital literacy reviewDigital literacy review
Digital literacy review
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Vocabulary link: Computer Science

  • 1. COMPUTER VOCABULARY Match the following concepts with their corresponding definitions. Write the number you deem more appropriate in the right column. 1. Adware It is a small piece of information on the times and dates you have visited web sites. A web server can temporarily store this information within your browser. The main purpose of cookies is to identify users and possibly prepare customized web pages for them. 2. Application Frequently asked questions 3. E-mail A program or tool such as Internet Explorer or Mozilla Firefox that enables you to browse or surf the World Wide Web and view internet sites. 4. Bug A particular kind of lettering (for example: Arial, Bookman, Times New Roman). 5. Cache It is any program designed to perform a specific function directly for the user. OpenOffice Writer, Gimp, Windows Media Player are examples of application programs 6. Cookies A software application which displays unwanted pop-up advertisements on your computer while in use. Adware is often installed on your computer at the same time as free software or shareware. 7. Crash A defect or fault in a computer program that prevents it from working correctly. Bugs are caused by mistakes or errors made by the people who write the program. 8. Cursor In computing, it is what happens when a program, or the entire operating system, unexpectedly stops working. 9. Driver A blinking symbol on the screen that shows where any new text will next be entered. 10. Home Page Business done over the internet or any internet-based network. 11. Browser Electronic mail: messages sent from one computer to another over the Internet. Page 1 / 3
  • 2. 12. FAQ A sort of fast memory used for temporary storage of recently accessed web pages, which enables the browser to display them more quickly on the next visit. 13. Hardware Specialized hardware or software designed to prevent unrestricted or unauthorized access into or out of a computer or network. 14. Font A special program which enables a computer to work with a particular piece of hardware such as a printer. 15. Firewall The physical equipment or touchable parts of a computer system, the CPU (central processing unit), the monitor, the keyboard, the mouse, the external speakers, the scanner, the printer, etc. 16. Hit A visit to a website. 17. E-business The main page or opening page that appears when you visit a web site. It usually contains links to the other pages. 18. Login Unwanted, irrelevant or inappropriate e-mail messages, especially commercial advertising. Also referred to as "junk e-mail". 19. Portal A device that enables a computer to send and receive information over a telephone line. You need a modem to connect to the Internet, to send email and to fax. 20. Program Network etiquette: a set of informal rules defining proper behaviour on the Internet. 21. Modem A website that acts as a gateway or entry point to the internet (for example, Yahoo). Typically, a portal offers a search engine and links to other sites grouped into categories, as well as news or other services. 22. Netiquette A sequence of instructions that a computer can interpret and execute in order to do a particular job. Programs are collectively referred to as "software". 23. Provider World Wide Web: A hypertext information system consisting of a network of web pages which runs on the Internet and can be accessed with a browser. Page 2 / 3
  • 3. 24. Scanner It is a malicious self-replicating program that spreads by inserting copies of itself into other executable code or documents, and whose sole intent is to cause problems on a computer. It acts in a way similar to a biological virus, and the infected file is called a host. 25. Spam A piece of hardware, or peripheral device, used to scan a document and create a digital copy. 26. Spyware Process by which a user enters a name and password to access a computer. 27. Trojan Software that collects information, without your knowledge, about your web-surfing. habits and uses it for marketing purposes. Very often contained in free downloads or shareware programs. 28. Videoconference What you see is what you get. (pronounced 'wizzy-wig'). A WYSIWYG application enables you to see on the screen exactly what will appear when the document is printed. 29. Virus It is a computer program that is hidden in a useful software application and actually used to gain access to your computer. It then performs malicious actions such as displaying messages or erasing files. Trojans may be found in a hacked legitimate program or in free software. 30. WYSIWYG Interactive, audiovisual meeting between two or more people in different geographic locations using two-way video technology. 31. WWW Company that provides access to the Internet. 32. Worm To zip a file is to compress it so that it occupies less space in storage and can be transferred quickly over the Internet. 33. Zip It is a self-replicating computer program, similar to a computer virus. It infects additional computers (typically by making use of network connections), often clogging networks and information systems as it spreads. Page 3 / 3