Page 134 - TP_Play_V2.1_class7
P. 134
Gl ssary
A set of programs that identify and remove malware are known as
F Antivirus antivirus software.
Computer Ethics are the common guidelines that we need to follow
F Computer Ethics
while using the computer.
A cyber crime can be defined as criminal activities carried out by
F Cyber Crime means of computers or the Internet.
Database implies that organising the data in a manner which helps to
F Database store and retrieve a large amount of data efficiently.
A firewall is a software or hardware-based network security system that
F Firewall controls the incoming and outgoing network traffic based on applied
rule set.
The process of linking a particular section of the same web page is
F Interlinking called interlinking.
The process of linking a web page to another web page of the same
F Intralinking website or another website is called intralinking.
A port is a slot on the motherboard that is used to connect other
F Port components of the computer such as keyboard, mouse, monitor, etc.
to the motherboard.
A query is the most powerful object of database that helps you to
F Query retrieve information from a table based on some criteria or condition.
Rootkit is a malware that gains administrator access to the host
F Rootkit system.
A sound card is a hardware device located inside the CPU box and
F Sound Card
used to convert the sound into digital data and vice-versa.
Switched Mode Power Supply (SMPS) is a hardware component of
F SMPS the computer used to control the power supply.
A computer virus is a ‘piece of code’ or program developed to corrupt
F Virus the data or program files stored on the computer system.
A worksheet is a main working area in Excel window where we can
F Worksheet enter data.
A computer worm is a type of malware that has the capability to
F Worm replicate itself without any human interaction.
132 Play (Ver. 2.1)-VII

