30 Ch.3 study facts

30 terms by krobb03

Create a new folder

Advertisement Upgrade to remove ads

encryption

a way to protect data by scrambling it

virus

a file that makes copies of itself to harm your computer

firewall

the computer program that finds and removes viruses

water

the liquid that short-circuits computers

humidity

the amount of water in the air

spyware

a virus used to monitor someone's activities on their computer

Standby Power Supply

a source of power available to computers in the event of power failiure

Uninterruptible Power Supply

a power supply that is always there unless the power source (such as batteries) run out of energy

video card

a circuit board that specificaly processes video/image feed

driver

this device tells the computer how to run hardware

surge supressor

prevents damage to electronics in the event of a power surge

power surge

a sudden increase of voltage that can damage unprotected computers

computer backup

the process of copying all files of a computer onto another data storage unit

humidity restrictor

this device is used on more modern computers to prevent humidity damage

physical damage

damage inflicted to a computer by dropping it, dropping something on it, etc.

printer jam

when a printer stops functioning properly because something got stuck

copyright ©

a legal document protecting someone's ideas or inventions

static electricity

electricity generated by friction (usually with a carpet)

computer protection

using things to prevent non-physical damage to your computer

when something breaks a law, it is considered _________

illegal

an object's ability to be moved easily calssifies it as ________

portable

a printer jam occurs when you use the _____ _____

wrong paper

_____ _______ can lead to a printer jam

dirty rollers

computers have a ________ effect on our lives

positive

computers make ________ more interisting

learning

computer __________ has gotten increasingly important

protection

____ is the most important thing to us

data

computer _____ is where your computer is taken

theft

tha computer is protected by its ________

firewall

firewalls _______ data

protect

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set