Page 116 - TP-Play_V-2.0_Book-7
P. 116

Gl    ssary







                                        A set of programs that identify and remove malware are known as
            F              Antivirus    antivirus software.

                                        Computer Ethics are the common guidelines that we need to follow
                F  Computer Ethics
                                        while using the computer.
                                        A  cyber  crime  can  be  defined  as  criminal  activities  carried  out  by
            F           Cyber Crime     means of computers or the Internet.

                                        Database implies that organising the data in a manner which helps to
            F              Database     store and retrieve a large amount of data efficiently.

                                        A firewall is a software or hardware-based network security system that
            F                Firewall   controls the incoming and outgoing network traffic based on applied
                                        rule set.
                                        The process of linking a particular section of the same web page is
            F           Interlinking    called interlinking.

                                        The process of linking a web page to another web page of the same
            F           Intralinking    website or another website is called intralinking.
                                        A port is a slot on the motherboard that is used to connect other
            F                    Port   components of the computer such as keyboard, mouse, monitor, etc.
                                        to the motherboard.
                                        A query is the most powerful object of database that helps you to
            F                  Query    retrieve information from a table based on some criteria or condition.

                                        Rootkit is  a malware that gains administrator access  to the host
            F                Rootkit    system.


                                        A sound card is a hardware device located inside the CPU box and
                F       Sound Card
                                        used to convert the sound into digital data and vice-versa.

                                        Switched Mode Power Supply (SMPS) is a hardware component of
            F                  SMPS     the computer used to control the power supply.


                                        A computer virus is a ‘piece of code’ or program developed to corrupt
            F                   Virus   the data or program files stored on the computer system.


                                        A worksheet is a main working area in Excel window where we can
            F            Worksheet      enter data.


                                        A computer worm is a type of malware that has the capability to
            F                 Worm      replicate itself without any human interaction.


            116       Play (Ver. 2.0)-VII
   111   112   113   114   115   116