Page 21 - Computer Terms

Computer Terms & Definitions 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
What Is An Input Device

What Is An Input Device?

Difficulty: Easy

An input device is any physical hardware device that sends data to a computer system. The most commonly used input devices are the keyboard and mouse, but there are lots of provide input to a computer.

What Is A USB Flash Drive

What Is A USB Flash Drive?

Difficulty: Easy

A USB flash drive, also known as a pen drive, thumb drive, USB keychain drive, memory stick, or simply a flash drive, is a small portable storage device that has a built-in USB connector and uses flash memory.

What Is Compression

What Is Compression?

Difficulty: Medium

Compression is the process of reducing the number of bits needed to represent data to reduce the file size, saving storage space and speeding up file transfers.

What Is A Menu-Based Interface

What Is A Menu-Based Interface?

Difficulty: Medium

A menu-based interface, also known as a menu-driven interface, is a type of user interface based on menus that present users with a list of options.

What Is A Command-Line Interface

What Is A Command-Line Interface?

Difficulty: Medium

A command-line interface (CLI), also known as a console-user interface, is a type of user interface based on text commands and a simple text-only interface.

What Is A Graphical User Interface

What Is A Graphical User Interface?

Difficulty: Medium

A graphical user interface (GUI) is a type of user interface based on graphical icons, windows, buttons, dialogue boxes, menu bars, tabs, toolbars, and images.

What Is A Fork Bomb

What Is A Fork Bomb?

Difficulty: Medium

A fork bomb, also known as a rabbit virus, is a type of DoS attack where an existing process is taken and continuously replicated to start new processes.

What Is Webcam Hijacking

What Is Webcam Hijacking?

Difficulty: Medium

Webcam hijacking, also known as camfecting, is the act of activating a user's webcam remotely over the internet and gaining access to it without their permission or knowledge.

What Is A CD

What Is A CD?

Difficulty: Easy

Stands for a Compact Disc. A CD is a type of portable optical storage media most commonly used to store digital audio recordings and data.

What Is A DVD

What Is A DVD?

Difficulty: Easy

Stands for a Digital Video Disc or Digital Versatile Disc. A DVD is a type of optical media which can store any kind of digital data.

What Is ROM

What Is ROM?

Difficulty: Medium

Stands for Read Only Memory. ROM is a form of permanent and non-volatile memory that computers can read but not write to or remove.

What Is Cryptojacking

What Is Cryptojacking?

Difficulty: Medium

Cryptojacking is the unauthorised use of someone else's computing resources to mine cryptocurrency. Cryptojacking malware often installs...

What Is Spoofing

What Is Spoofing?

Difficulty: Medium

Spoofing is the act of pretending to be something or someone else to deceive other users. This is accomplished by disguising the identity of...

What Is An Intrusion Prevention System

What Is An Intrusion Prevention System?

Difficulty: Medium

An intrusion prevention system (IPS), also known as an intrusion detection prevention system is a security system that protects an organisation's network from malicious activity.

What Is Cybersecurity

What Is Cybersecurity?

Difficulty: Easy

Cybersecurity is the practice of using measures to protect systems and networks against the unauthorised or criminal use of data and malicious attacks.

What Is The HTML Cite Tag

What Is The HTML <cite> Tag?

Difficulty: Medium

In HTML, the <cite> tag is used to provide a reference or title to a piece of work, like books, paintings, poems, songs, films, etc.

What Is The HTML Iframe Tag

What Is The HTML <iframe> Tag?

Difficulty: Medium

In HTML, the <iframe> tag is used to specify an inline frame within a HTML document, which loads a webpage inside another webpage.

What Is A Cyberattack

What Is A Cyberattack?

Difficulty: Easy

A cyberattack is an intentional attempt to disrupt or harm a computer system or network. Cyberattacks are performed by cybercriminals with malicious intent.

What Is Cybercrime

What Is Cybercrime?

Difficulty: Easy

Cybercrime is a type of criminal activity carried out by a computer and a network. A person that engages in cybercrime is known as a cybercriminal.

What Is An Internet Troll

What Is An Internet Troll?

Difficulty: Medium

An internet troll is a person online who intentionally causes disruption by posting off-topic, upsetting, controversial, or disturbing content or messages in order to get a reaction out of people.

What Is Clickjacking

What Is Clickjacking?

Difficulty: Medium

Clickjacking, also known as a user interface redress attack, or UI redressing, is the practice of using multiple invisible user interface layers to trick users into clicking....

What Is Cyberstalking

What Is Cyberstalking?

Difficulty: Medium

Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to...

What Is Phreaking

What Is Phreaking?

Difficulty: Medium

Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls.

What Is A Digital Footprint

What Is A Digital Footprint?

Difficulty: Medium

A digital footprint is the traces, trails, and records of activity and data an individual or organisation leaves behind whilst using the internet.

What Is A Hacker

What Is A Hacker?

Difficulty: Easy

A hacker is a person that uses their technical skills to gain unauthorised access to computer systems. Hackers can gain unauthorised access to systems in...

What Is Spam

What Is Spam?

Difficulty: Easy

Spam is a form of unsolicited and unwanted online communication sent to an individual or a large number of individuals that can be distributed through email messages, instant messaging sessions...

What Is A Watering Hole Attack

What Is A Watering Hole Attack?

Difficulty: Medium

A watering hole attack is a type of cyberattack where the attacker identifies websites that are commonly visited by members of an organisation and infects them with malware.

What Is An Email Bomb

What Is An Email Bomb?

Difficulty: Medium

An email bomb, also known as a mail bomb, is a type of cyberattack where the attacker sends a large number of email messages to one or more email addresses to flood the mailboxes.

What Is Email Bankruptcy

What Is Email Bankruptcy?

Difficulty: Medium

Email bankruptcy is the process of wiping out, ignoring all emails older than a specific date, or closing an email account, due to an excessively large amount of email messages.

What Is A Potentially Unwanted Program

What Is A Potentially Unwanted Program?

Difficulty: Medium

A potentially unwanted program, also known as a potentially unwanted application, a PUP, a PUA, or junkware, is a type of program that is not strictly malicious, but may be unwanted for the user.