Front | Back |
Backup
|
Saving files to a removable disk or other independent storage device that can be used to restore data if the primary system becomes inaccessible
|
Data Theft
|
Confidential and private information stored on computers being stolen by thieves and hackers
|
Driver
|
A small program that instructs the operating system on how to operate specific hardware
|
Encryption
|
Secure process for keeping confidential information private
|
Humidity
|
Environmental condition that can affect the performance of computer systems
|
Ping
|
DOS command to test connectivity and isolate hardware problems and any mismatched configurations
|
Power Spikes
|
Short, fast transfers of electrical voltage, current, or energy
|
Surge Suppressor
|
Plug into electric outlets to protect computers against power spikes
|
Uninterruptible Power Supply (UPS)
|
Device that provides power to computers if the normal current is interrupted
|
Cable Management
|
Organizing and protecting computer system cables
|
Corona Wires
|
Laser printer wires used to generate a field of positive charges on the surface of the drum and the paper
|
Cookie
|
Small text file that a Web site uses to identify a specific computer
|
Defragmentation
|
A process that reduces the amount of fragmentation on a disk by physically organizing the contents of the disk so the pieces of each file are stored contiguously
|
Fragmentation
|
Occurs when a piece of data is broken up into many pieces that are not stored close together
|
Ergonomic Keyboard
|
Keyboard that allows for a more natural positioning of arms and hands
|