Page 134 - TP_Play_V2.1_class7
P. 134

Gl    ssary








                                              A set of programs that identify and remove malware are known as
                  F              Antivirus    antivirus software.

                                              Computer Ethics are the common guidelines that we need to follow
                      F  Computer Ethics
                                              while using the computer.

                                              A  cyber  crime  can  be  defined  as  criminal  activities  carried  out  by
                  F           Cyber Crime     means of computers or the Internet.

                                              Database implies that organising the data in a manner which helps to
                  F              Database     store and retrieve a large amount of data efficiently.

                                              A firewall is a software or hardware-based network security system that
                  F                Firewall   controls the incoming and outgoing network traffic based on applied
                                              rule set.
                                              The process of linking a particular section of the same web page is
                  F           Interlinking    called interlinking.


                                              The process of linking a web page to another web page of the same
                  F           Intralinking    website or another website is called intralinking.

                                              A port is a slot on the motherboard that is used to connect other
                  F                    Port   components of the computer such as keyboard, mouse, monitor, etc.
                                              to the motherboard.
                                              A query is the most powerful object of database that helps you to
                  F                  Query    retrieve information from a table based on some criteria or condition.


                                              Rootkit is  a malware that gains administrator access  to the host
                  F                Rootkit    system.


                                              A sound card is a hardware device located inside the CPU box and
                      F       Sound Card
                                              used to convert the sound into digital data and vice-versa.

                                              Switched Mode Power Supply (SMPS) is a hardware component of
                  F                  SMPS     the computer used to control the power supply.


                                              A computer virus is a ‘piece of code’ or program developed to corrupt
                  F                   Virus   the data or program files stored on the computer system.

                                              A worksheet is a main working area in Excel window where we can
                  F            Worksheet      enter data.


                                              A computer worm is a type of malware that has the capability to
                  F                 Worm      replicate itself without any human interaction.


                  132       Play (Ver. 2.1)-VII
   129   130   131   132   133   134