Page 162 - iPro_trackGPT_V5_Class7
P. 162

#Digital Literacy



                  Gl    ssary







                                               A set of programs that identify and remove malware is known as antivirus
                                 Antivirus
                                               software.

                                              Computer Ethics are the common guidelines that we need to follow while
                        Computer Ethics
                                              using the computer.

                                               A cyber crime can be defined as criminal activities carried out by means of
                              Cyber Crime
                                               computers or the Internet.
                                               Database implies organising the data in a manner which helps store and
                                Database
                                               retrieve a large amount of data efficiently.
                                               A firewall is a software or hardware-based network security system that controls
                                  Firewall
                                               the incoming and outgoing network traffic based on an applied rule set.

                                               The process of linking a particular section of the same web page is called
                              Interlinking
                                               interlinking.

                                               The process of linking a web page to another web page on the same
                              Intralinking
                                               website or another website is called intralinking.

                                               A port is a slot on the motherboard that is used to connect other components of
                                      Port
                                               the computer, such as a keyboard, mouse, monitor, etc., to the motherboard.

                                               A query is the most powerful object in a database that helps you retrieve
                                    Query
                                               information from a table based on some criteria or condition.

                                  Rootkit      Rootkit is a malware that gains administrator access to the host system.


                                               A sound card is a hardware device located inside the CPU box and used to
                              Sound Card
                                               convert the sound into digital data and vice-versa.

                                               Switched-Mode  Power  Supply  (SMPS)  is a  hardware  component  of  the
                                    SMPS
                                               computer used to control the power supply.

                                               A computer virus is a ‘piece of code’ or program developed to corrupt the
                                     Virus
                                               data or program files stored on a computer system.

                                              A computer worm is a type of malware that has the capability to replicate
                                    Worm
                                              itself without any human interaction.

                                               A worksheet is the main working area in an Excel window where we can
                               Worksheet
                                               enter data.


                   160    TrackGPT iPRO (V5.0)-VII
   157   158   159   160   161   162