2 Acceptable Use Policies Anti - virus software Application Software Used to protect a network by providing guidelines and rules as to howPoliciesthe network can and should be used.Set of utility programs that looks for and eradicates viruses; that must beAnti-virus softwarekept current because new viruses are always being written.A computer program designed to carry out specialized tasks such asApplication Softwareword processing, spreadsheets, slide shows, or electronic mail.An electronic or digital method for representing letters or numbersBinary Numbersusing two digits, 0 and 1.BitEach 0 or 1Sequence of events that occurs between the time you turn on aBoot Processcomputer and the time that it becomes ready to accept commands.Infects the system files that your computer uses every time it is turnedBoot Sector Viruson; causes widespread damage and recurring problems.Byte8 bits
3 CD - ROM Central Processing Unit (CPU) Circuits Client Computer Storage device that uses laser technology to read data permanentlyCD-ROMstored on compact disks, cannot be used to write data to a disk.Central ProcessingWhere the processing in a computer takes place, often called the brain ofUnit (CPU)the computer.The paths from one component of a computer to another that data usesCircuitsto travel.The software on a network workstation that allows access to files andClientperipheral devices through a server.A device that accepts input, processes data, uses memory, providesComputerstorage, and produces output, all according to a series of storedinstructions.A computer program that is designed to replicate itself by copying intoComputer Virusother programs stored in a computer.A form of legal protection that grants certain exclusive rights to theCopyrightscreator of a program or musical work.Refers to the way in which letters, numbers, and symbols represent facts,Dataobjects, or ideas.
4 Drive E - Mail Encryption Ethics File File Server File Virus A location on a network that is set aside for the collection of data.A system for sending and receiving messages electronically overE-Mailcomputer networks.The manipulation of data to prevent accurate interpretation by all butEncryptionthose for whom the data is intended.A set of principles of right conduct; a theory or a system of moral values;Ethicsand the rules or standards governing the conduct of a person or themembers of a profession.FileA named collection of data that exists on a storage device.File ServerA computer that supplies users with data; through the use of a network.File VirusVirus that attaches to an application program, such as a game.A type of magnetic storage the uses a round piece of flexible plasticFloppy Diskcovered with a thin layer of oxide and sealed inside a protective covering.
5 Folder Gigabyte Graphic User Interface (GUI) Handheld Hard Drive The subdirectory or subdivision, of a drive that can contain files and/orFolderother folders.GigabyteApproximately 1 billion bytes.Graphic UserA user interface that features on-screen objects, such as menus and iconsInterface (GUI)that are manipulated by a mouse.A computer that fits into a pocket, runs on batteries, and is used whileHandheldholding the unit in your hand.The main storage location for a computer that is mounted inside theHard Drivecomputer’s system unit.The mechanical, magnetic, and electrical components making up aHardwarecomputer system; anything on or in the computer that is touchable.InformationThe results of the computer receiving and storing data.InputLetters, numbers, and symbols entered into a computer for processing.
6 Input Devices Internet IP Addresses Keyboard Kilobyte Laptop Computer Units that gather information and transform that information it into aInput Devicesseries of electronic signals that a computer recognizes.A collection of local, regional, national, and international computerInternetnetworks that are linked together to exchange information.A unique identifying number assigned to each computer connected to aIP Addressesnetwork.The arrangement of letters, numbers, and special function keys that act asKeyboardthe primary input device for a computer.KilobyteApproximately 1,000 bytesA portable, compact microcomputer computer that can run onLaptop Computerelectricity or a battery unit.Local Area NetworkA network of computers in the same building or small geographical area.(LAN)Logic BombWatches for a specific set of input to activate the virus.
7 Macro Virus Magnetic Storage Mainframe Megabyte Megahertz Memory A virus that attaches itself to a miniature program and replicates whenMacro Virusthat macro is used.The recording of data onto disks or tape by magnetizing particles of anMagnetic Storageoxide surface coating.Very large expensive computer capable of simultaneously processing orMainframestoring data for thousands of users.MegabyteApproximately 1 million bytesMegahertzA measurement used to describe the speed of the system clock.Area of the computer that temporarily holds data waiting to beMemoryprocessed, stored, or output.A personal computer; designed to meet the computer needs of anMicrocomputerindividual.An input device that makes possible the transmission of data to or fromModemother computers over telephone or cable lines.
8 Monitor Mouse Multitasking Network Network Interface Card (NIC) Output device that forms an image by converting electrical signals fromMonitorthe computer into points of colored light on the screen.An input device that allows the user to manipulate objects on the screenMouseby moving the device along a surface.MultitaskingRunning more than one program at a time.Two or more computers and other devices (printers or scanners) thatNetworkare connected, for the purpose of sharing data and programs.Network InterfaceA circuit board inside most computers, that coverts the digital signalsCard (NIC)from a computer into signals that can travel over a network.Master controller for all activities that take place within a computer; itsOperating Systemprimary purpose is to help the computer monitor itself in order tofunction efficiently.Means of reading and recording data as light and dark spots on CD andOptical StorageDVD.OutputThe processing results, seen on a monitor or printed on paper.
9 Output devices Pentium Peripheral devices Platform Printer Processing Units that transform a computer’s electronic signals into information thatOutput devicescan be displayed or printed.PentiumA name given to the 5th generation of the Intel central processing unit.Peripheral devicesUsed to expand the computer’s input, output and storage capabilities.PlatformUnderlying hardware and software of the computer system.PrinterOutput device that produces text or graphical images on paper.ProcessingManipulation or changing of the data in many ways.The precise step-by-step instructions enabling a computer to solve aProgramproblem.The ability of a computer to process information and save data to theRAMlocation specified.
10 ROM Shareware Silicon Chips Software Software Licenses Sound Card When data can be read from a file, but a user cannot change or modifyROMthe data.Computer program that is freely distributed for a trial period, such as 30Sharewaredays, and then the user must pay a fee to continue using the program.Silicon is melted sand and what circuits are embedded into to keep themSilicon Chipstogether.A computer program that tells the computer how to perform particularSoftwaretasks.A legal contract that defines the ways in which you may use a computerSoftware Licensesprogram.An input device that is a circuit board giving the computer the ability toSound Cardaccept audio input, play sound files, and produce audio output.Output devices that receive signals from a sound card in order to hearSpeakerssound effects.Area of the computer that holds data on a permanent basis when it isStoragenot immediately needed for processing.
11 Storage devices Supercomputer Switch System Unit Terabyte Time Bomb Output devices that are used to keep data when the power to theStorage devicescomputer is off.A computer that was the fastest in the world at the time it wasSupercomputerconstructed.A piece of computer equipment that connects several devicesSwitch(computers or printers) to a network.The case that holds the power supply, central processing unit, storageSystem Unitdevices, and all circuit boards.TerabyteApproximately 1 trillion bytesWatches for the computer clock to reach a certain date or time toTime Bombactivate the virus.Trigger EventsAn event that activates a task often associated with a computer virus.Computer program that seems to perform one legitimate function whileTrojan Horseactually doing something destructive somewhere else.
12 USB Wide Area Network (WAN) Workstation Worm An external interface for communication between a computer andUSBperipheral devices over a single data line at very high speeds.Wide Area NetworkA network of computers in different locations and allows for access to(WAN)computers all over the world.Powerful desktop computer designed for specialized tasks that require aWorkstationlot of processing speed. Refers to a personal computer connected to anetwork.Software virus that enters a computer network through security holesWormand once in the network the virus becomes active.