data entered into the computer through a variety of devices such as a keyboard, microphone, scanner, flash drive, or mouse
What is input device
software that automatically displays or downloads advertising material (often unwanted) when a user is online.
What is adware
"Bad Hacker"-hacks into things for personal purposes, not to help.
What is Black Hat Hacker
a feature that allows the user to change the attributes of a file (such as location, file name, or file type) before saving it
What is save as
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
What is cyberbullying
allows the user to view or listen to the data a computer processes such as a monitor, printer, headphones, or speakers
What is output device
program that tracks and spies on you with the intent to collect information.
What is spyware
system software that acts as a "go-between", allowing computer hardware and other software to communicate with each other
What is operating system
computer software created to allow the user to perform specific a job or task Examples: Word processing, Spreadsheets,
What is application software
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware
What is antivirus software
infected program with the purpose of some sort of destruction.
What is virus
storing data for later use
What is save
"Good Hacker"-work to find ways into systems to help computer companies fix holes in systems.
What is White Hat Hacker
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
What is firewall
additional hardware that isn't necessary for a computer to function, but does enhance how the computer can be used
What is peripheral device
Spreads the virus over a network of computers
What is computer worm
attempt to get personal information, usually bank account info.
What is phishing
A crime that involves someone pretending to be another person in order to steal money or obtain benefits
What is identity theft
A program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system
What is file management
malicious file. Disguised as something else to trick someone in opening it.
What is Trojan Horse
executes commands from a computer's hardware and software; the "brain" of a computer
What is central processing unit
an extension at the end of a file name, indicating which application was used to create a document
What is file type
software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management Examples: BIOS, Microsoft Windows,
What is System software
a computer case that contains the CPU, power supply, memory, and storage
What is system unit
Name three output devices
What is speakers, monitor, printer, headphones, projector, etc.