Page 434 - IT 402 v2.0 class 10
P. 434
16. Impairment: It refers to non-cognizance or non-matching between a normal standard of some
functionality and an abnormal standard.
17. Macros: Macros are the set of stored functions that can be used to automate processes that are repeated
often.
18. Malware: It refers to infectious programs that hampers the functioning of a computer system.
19. Phishing: Phishing attacks are the social-engineering practice of sending fraudulent communications
that appear to come from an authentic source.
20. Phrase: A phrase is a group of words that stand together as a single grammatical unit, typically as part
of a clause or a sentence.
21. Primary key: It is a field which is used to uniquely identify records in a database. It is a unique field and
it cannot be left blank.
22. Resizing: It is the process of altering the image size without cutting any part of the image. When resizing.
23. Spoofing: It is the act of disguising a communication from an unknown source as being from a known
and trusted source.
24. Self-motivation: It is defined as the force within you that drives you to do things without any influence.
25. Sorting: It means to arrange the data of a table in a particular order like, in ascending or descending
order.
26. Table: It is a collection of organised data in the form of rows and columns. It is used to represent the
relations.
27. Template: A template is a document that contains pre-defined formatting styles, graphics, tables,
objects, and other information that are commonly used in a particular pattern.
28. Query: Queries are commands that are used to define the data structure and also to manipulate the
data in the database.
29. Web Browser: It is an application software program to access the World Wide Web.
30. WWW: The ‘World Wide Web’ is a framework for accessing the documents that are spread over millions
of computing devices over the Internet.
432 Touchpad Information Technology-X

