Upgrade to remove ads Show
Only ₩37,125/year
Vocabulary from Discovering Computers Fundamentals 2011 Edition Terms in this set (130)administrator account Computer account held by computer and network administrators that enables them to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network adware remover Program that detects and deletes adware from a user's computer anti-spam program Program that attempts to remove spam before it reaches a user's inbox antivirus program Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files automatic update Operating system feature that automatically provides updates to a program backup utility Utility program that allows users to copy, or back up, selected files or an entire hard disk to another storage medium, such as another hard disk, optical disc, USB flash drive, or tape BIOS Basic input/output system; firmware that contains the computer's startup instructions boot disk Special disk that contains a few system files capable of starting a computer, which is used when the computer cannot boot from its hard disk boot drive Drive from which a personal computer boots (starts) booting Process of starting or restarting a computer buffer Segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. cold boot Process of turning on a computer that has been powered off completely command-line interface Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions defragmenting Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer disc burning software Utility program that writes text, graphics, audio, and video files to a recordable or rewriteable CD, DVD, or Blu-ray Disc disk defragmenter Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster driver (device driver) Small program that tells an operating system how to communicate with a specific device embedded operating system The operating system that resides on a ROM chip inside most PDAs and small devices file compression utility Utility program that shrinks the size of a file(s), so that the file takes up less storage space than the original file file manager Utility that performs functions related to file management folder Specific named location on a storage medium that contains related documents graphical user interface (GUI) Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons hibernate Operating system function that saves any open documents and programs to a hard disk before removing power from the computer image viewer Utility that allows users to display, copy, and print the contents of a graphics file, such as a photo Linux Popular, multitasking UNIX-type operating system log on To access a computer or network as a user Mac OS X Multitasking operating system that is the latest version of the Macintosh operating system Macintosh operating system Operating system for Apple's Macintosh computer media player Utility program that allows you to view images and animation, listen to audio, and watch video files memory management Operating system activity that optimizes the use of random access memory (RAM) operating system (OS) Set of programs that coordinates all the activities among computer hardware devices password Private combination of characters associated with a user name that allows access to certain computer resources performance monitor Operating system program that assesses and reports information about various computer resources and devices personal computer Computer that can perform all of its input, processing, output, and storage activities by itself and contains a processor, memory, and one or more input and output devices, and storage devices personal firewall Utility program that detects and protects a personal computer from unauthorized intrusions phishing Scam in which a perpetrator attempts to obtain your personal and/or financial information phishing filter Program that warns or blocks you from potentially fraudulent or suspicious Web sites Plug and Play Technology that gives a computer the capability to configure adapter cards and other peripherals automatically as a user installs them pop-up blocker Filtering program that stops pop-up ads from displaying on Web pages queue Lineup of multiple print jobs within a buffer recovery disk Special disk that contains a few system files capable of restarting a computer, which is used when the computer cannot boot from its hard disk restore utility Program that reverses the backup process and returns backed up files to their original form screen saver Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time search utility Program that attempts to locate a file on your computer based on criteria you specify server operating system Operating system that organizes and coordinates how multiple users access and share resources on a network service pack Free downloadable software updates provided by the software manufacturer to users who have registered and/or activated their software shortcut Icon on the desktop that provides a user with immediate access to a program or file sleep mode Operating system function that saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state spam Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once spooling Operating system process that sends documents to be printed to a buffer instead of sending them immediately to the printer spyware remover Program that detects and deletes spyware and other similar programs on a user's computer stand-alone operating system Complete operating system that works on a desktop computer, notebook computer, or mobile computing device system software Programs that control or maintain the operations of a computer and its devices Trojan horse Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program uncompress (unzip) To restore a compressed, or zipped, file to its original form uninstaller Utility program that removes a program, as well as any associated entries in the system files UNIX Multitasking operating system that now is available for most computers of all sizes user ID Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user user interface The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen user name Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user utility program (utility) Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs virtual memory A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM virus Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user's knowledge or permission warm boot Process of using the operating system to restart a computer Web filtering software Program that restricts access to certain material on the Web Windows 7 Microsoft's fastest, most efficient operating system to date, offering quicker program start up, built-in diagnostics, automatic recovery, improved security, enhanced searching and organizing capabilities, and an easy-to-use interface Windows Aero Interface for computers with more than 1 GB of RAM that provides an enhanced visual look, additional navigation options, and animation Windows ReadyBoost Windows feature that can allocate available storage space on removable flash memory devices as additional cache worm Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system zipped files Type of compressed files that usually have a .zip extension adware program that displays an online advertisement. Aero Flip 3D program in Windows 7 where users flip through windows by rolling the wheel on their mouse. backup it is to copy selected files or an entire hard disk to another storage medium such as a hard disk, USB, etc. background computer programs running but not in use BlackBerry Operating System that runs on handheld devices run by RIM RIM Research In Motion bugs errors in programs or enhancements to security, modifications to drivers,access to new or expanded components such as desktop themes or applications software on the computer Client operating systems stand-alone operating system that works with the conjunction with a server operating system and work with or without a network command language set of commanads entered into the computer compress shrink the size of a file during the backup process cross-platform program that runs computer software on multiple operating systems Desktop Gadget Gallary program that allows users to display multiple gadgets in the desktop device-dependent program that runs only on a specific type or make of computer Disk Cleanup utility that searches for and removes unnecessary files Embedded Linux scaled-down Linux OS designed for smart phones, PDAs, and devices requiring an embedded OS Encryption process of encoding data and information into unreadable form fault-tolerant computer computer with a separate processor that continues to operate when one of its components fails, ensuring that no data is lost. foreground active (the one you are using) program when running multiple programs fragmented contents of a file are scattered across two or more noncontiguous sectors gadget (widget) mini-program with minimal functionality that connects to another program or provides information ghosting images etched permanently on a monitor's screen Google Android OS used on more that 20 different mobile devices hacker someone that tries to enter the network illigally index utility that assists with locating files quickly by storing information about a file, including name, date created, and so on. Internet Explorer web browser included since Windows 98 Kernel core of the OS manages memory and devices, maintains the computer's clock, starts programs, and assigns the computer's resources. lossless compressing a file where the file can be return to its original size state lossy compressing a file where the file cannot be return to its original size state, the quality of the file decreases each time the file is compress malware (malicious software) software that acts without a user's knowledge and deliberately alters the computer's operations memory resident remains in the computers memory while the computer is running multiprocessing OS that supports two or more processors running programs at the same time. It increases the computer's speed. multipurpose OS system that has both a stand-alone and a server OS and is capable of handling a high volume of transactions and multiuser environment and working with multiple processors using multprocessing multiuser OS enables two or more users to run programs simultaneously NetWare server OS designed for client/server networks. It supports open source software and runs on all types of computers from mainframes to personal computers network administrator person overseeing network operations, uses the server OS to add and remove users, computers and other devices to and from the network nonresident instructions remaining in the storage medium until needed open source software software whose code is provided for use, modification, and redistribution. page amount of data and program instructions that can swap at a given time paging time-consuming process technique for the computer of swapping items between memory and storage. Palm OS competing OS to Windows 7, runs on smart phones and PDAs permisions define who can access certain resouruces and when they can access those resources platforms another name of the operating system a computer uses pop-ad ad Internet advertisement that suddenly appears in a new window in the foreground of a Web page displayed in your brouser Power-On Self Test (POST) self-test executed by the BIOS to make sure that the hardware is connected properly and operated correctly. preemptive multitasking used to prevent any one process from monopolizing the computer's resources, the OS interrupts a program that is executing and passes control to another program waiting to be executed print spooler program that intercepts documents to be printed from the OS and places them in the queue proprietary software privately owned and limited to a specific vendor or computer registry consists of several files that contains the system configuration information single user/multitasking allows a single user to work on two or more programs that reside in the memory at the same time. single user/single tasking allows one user to run one program at the time
Snipping Tool copies screen elements to a file on your computer Solaris server OS design specially for the e-commerce applications developed by Sun Microsystems. It is a version of UNIX. spyware program placed on a computer without the user's knowledge that secretly collects information about the user, often related to Web browsing habits. Startup folder folder that contains list of programs that open automatically when you boot the comuter swap files area of the hard disk used for virtual memory that swaps data, information between memory and storage. Symbian OS multitasking open source OS design for smart phones. It allows users to communicate wirelessly. system files specific operating system files thrashing it is when the OS spends too much time paging instead of executing an application software vertualization practice of sharing or pooling computers resources such as servers virus author programmer of a virus. Recommended textbook solutionsIntroduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions Starting Out with Python3rd EditionTony Gaddis 610 solutions Sets with similar termsChapter 7 - Operating Systems and Utility Programs71 terms shugo89149PLUS Chapter 7 - Operating Systems and Utility Programs72 terms mrsvin Discovering Computers Chapter 469 terms itech200 Discovering Computers Chapter 469 terms Anne_Montre Sets found in the same folderChapter 8 - Communications and Networks102 terms Caricia_Heredia Chapter 9 - Database Management91 terms Caricia_Heredia Chapter 10 - Computer Security and Safety, Ethics,…163 terms Caricia_Heredia Other sets by this creatorReview of the terms and Electron Theory32 terms Caricia_Heredia Math Vocabulary16 terms Caricia_Heredia PLC 2 (Professor Gonzalez)23 terms Caricia_Heredia Citizenship civic people5 terms Caricia_Heredia Verified questionsCOMPUTER SCIENCE Assuming that no threads belong to the REALTIME_PRIORITY_CLASS and that none may be assigned a TIME_CRITICAL priority, what combination of priority class and priority corresponds to the highest possible relative priority in Windows scheduling? Verified answer
COMPUTER SCIENCE T F Initialization of static local variables only happens once, regardless of how many times the function in which they are defined is called. Verified answer COMPUTER SCIENCE Write pseudocode for a procedure that creates an empty van Emde Boas tree. Verified answer
COMPUTER SCIENCE Write code that prompts the user to enter a number in the range of 1 through 100 and validates the input. Verified answer Other Quizlet setsBIOL 1030 EXAM 2 QUESTIONS - (FINAL STUD…37 terms krm0051 tic tac toe 2017-2018 part 151 terms fulcherkids Related questionsQUESTION The Shortest Seek Time First device-scheduling algorithm moves the arm methodically from the inner to the outer track, servicing every request in its path. 5 answers QUESTION What is a central secure database that stores all hardware configuration information, software configuration information, and the system security configuration policies? 10 answers QUESTION Processes run in a tight loop between... (pick most correct) 2 answers QUESTION What are the 4 design principals 8 answers What is a utility program that can make copies of all information stored on a disk and restore either the entire disk or selected files?Backup software makes copies of all information stored on a disk and restores either the entire disk (aka Disk cloning) in an event of disk failure or selected files that are accidentally deleted or corrupted.
What type of utility program is Scan Disk?ScanDisk is a Windows utility used to check your hard disk for errors and to correct problems that are found. These errors often occur when Windows locks up and must be restarted.
What is the term for a utility program that is used to make a copy of all the files on a disk?Backup Utility
This utility software helps to back up the files, folders, databases, or complete disks. Moreover, backup refers to duplicating the disk information so that the data can be restored if any data loss happens.
What are utility programs in operating system?Utility software helps users configure, analyse, optimise and maintain a computer. This software normally consists of small programs which are thought of as part of the operating system (OS) as they often come built in with the OS.
|