Computer Software
Operating System
Abbreviation
Data and Security Threats
Go Online
100

It is a graphical word processing program that users can type with. It is made by the computer company Microsoft. Its purpose is to allow users to type and save documents.

Microsoft Word

100

It is a computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs). Featuring the first graphical user interface (GUI) for IBM-compatible PCs, the Windows OS soon dominated the PC market.

Microsoft Windows 

100

It's a chip that runs computer programs and processes input data into a readable format understood by humans, considered as the "brain of the computer". 

CPU

100

It is an act committed by an intruder by accessing your computer system without your permission. 

Hacking

100

It is bullying that takes place over digital devices like cell phones, computers, and tablets.

Cyberbullying

200

It is a spreadsheet developed by Microsoft for Windows, macOS, Android, and iOS. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications.

Microsoft Excel

200

It is a series of proprietary graphical operating systems developed and marketed by Apple Inc.

MAC OS

200

This stores data while the computer is running but loses the data once the computer is switched off.

RAM

200

It is the unauthorized use and distribution of computer software. 

(Software) Piracy

200

It is the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Copyright

300

It is a powerful presentation software developed by Microsoft. The program uses slides to convey information rich in multimedia. The term "slide" refers to the slide projector, which this software effectively replaces.

Microsoft PowerPoint

300

It is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone and iPod Touch

iOS

300

It is a plug and play interface that allows a computer to communicate with peripheral and other devices.

USB

300

It occurs when someone steals your identity and pretends to be you to access resources such as credit cards, bank accounts, and other benefits in your name. 

Identity theft

300

It is defined as a set of rules for acceptable online behavior.

Netiquette

400

It is a desktop publishing application from Microsoft, differing from Microsoft Word in that the emphasis is placed on page layout and design rather than text composition and proofing.

Microsoft Publisher

400

It is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.

Android

400

It is the standard markup language for Web pages.

HTML

400
It is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords.



Phishing

400

It is the practice of taking someone else's work or ideas and passing them off as one's own.

Plagiarism

500

It is a raster graphics editor developed and published by Adobe Inc. for Windows and macOS. It was originally created in 1988 by Thomas and John Knoll. Since then, the software has become the industry standard not only in raster graphics editing but in digital art as a whole.

Adobe Photoshop

500

It is the most used open-source operating system created by Linus Torvalds. 

Linux

500

It is a file format that provides an electronic image of text or text and graphics that looks like a printed document and can be viewed, printed, and electronically transmitted.

PDF

500

It is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

(Distributed) Denial-of-Service Attack

500

It is a judicial doctrine that refers to use a copyrighted material that does not infringe or violate the exclusive rights of the copyright holder. 

Fair use