SlideShare uma empresa Scribd logo
1 de 12
PROCESS OF LOCATING THE NONCONTIGUOUS
FRAGMENTS OF DATA INTO WHICH A
COMPUTER FILE MAY BE DIVIDED
AS IT IS STORED ON A HARD DISK, AND
REARRANGING THE FRAGMENTS AND RESTORING
THEM INTO FEWER FRAGMENTS OR INTO THE
WHOLE FILE.
DETERIORATION OF COMPUTER DATA
AS A RESULT OF SOME EXTERNAL
AGENT
TO REQUEST CONFIDENTIAL INFORMATION OVER
THE INTERNET OR
BY TELEPHONE UNDER FALSE PRETENSES IN ORDER
TO FRAUDULENTLY OBTAIN CREDIT CARD NUMBERS,
PASSWORDS, OR OTHER PERSONAL DATA.
REFERS TO THE COPYING AND
ARCHIVING OF COMPUTER DATA
SO IT MAY BE USED TO RESTORE THE
ORIGINAL AFTER A DATA LOSS EVENT.
AN INDIVIDUAL WHO USES COMPUTER,
NETWORKING
OR OTHER SKILLS TO OVERCOME A
TECHNICAL PROBLEM.
TYPE OF UTILITY USED FOR
SCANNING AND
REMOVING VIRUSES FROM YOUR
COMPUTER.
TO PREPARE THE CHOSEN PARTITION
ON THE DRIVE TO BE USED BY
AN OPERATING SYSTEM BY DELETING
ALL OF THE DATA1 AND SETTING UP A
FILE SYSTEM.
MALICIOUS LITTLE PROGRAMS CAN
CREATE FILES, MOVE FILES, ERASE FILES,
CONSUME YOUR COMPUTER'S MEMORY,
AND CAUSE YOUR COMPUTER NOT TO
FUNCTION CORRECTLY.
RELATIVELY MINOR RELEASE OR VERSION
UPGRADE TO
AN EXISTING SOFTWARE PRODUCT THAT
ADDS MINOR FEATURES OR CORRECTS
BUGS.
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE
A SOFTWARE THAT IS INSTALLED ON A
COMPUTING DEVICE
WITHOUT THE USER'S KNOWLEDGE OR
PERMISSION.
Troubleshooting vocab

Mais conteúdo relacionado

Semelhante a Troubleshooting vocab

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
STO STRATEGY
 

Semelhante a Troubleshooting vocab (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
It security
It securityIt security
It security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Information systems
Information systemsInformation systems
Information systems
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Computer security
Computer securityComputer security
Computer security
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 

Mais de Frya Lora (20)

GPU
GPUGPU
GPU
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unit
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012
 
Mod4 l2.2
Mod4 l2.2Mod4 l2.2
Mod4 l2.2
 
Mod4 l2.1
Mod4 l2.1Mod4 l2.1
Mod4 l2.1
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautions
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computers
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Port types
Port typesPort types
Port types
 
Ergonomics
ErgonomicsErgonomics
Ergonomics
 
Network cable
Network cableNetwork cable
Network cable
 
Functions and formulas
Functions and formulasFunctions and formulas
Functions and formulas
 
2.4
2.42.4
2.4
 
2.3
2.32.3
2.3
 
Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpoints
 
2.2
2.22.2
2.2
 
2.1
2.12.1
2.1
 
5 s
5 s5 s
5 s
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Troubleshooting vocab

  • 1. PROCESS OF LOCATING THE NONCONTIGUOUS FRAGMENTS OF DATA INTO WHICH A COMPUTER FILE MAY BE DIVIDED AS IT IS STORED ON A HARD DISK, AND REARRANGING THE FRAGMENTS AND RESTORING THEM INTO FEWER FRAGMENTS OR INTO THE WHOLE FILE.
  • 2. DETERIORATION OF COMPUTER DATA AS A RESULT OF SOME EXTERNAL AGENT
  • 3. TO REQUEST CONFIDENTIAL INFORMATION OVER THE INTERNET OR BY TELEPHONE UNDER FALSE PRETENSES IN ORDER TO FRAUDULENTLY OBTAIN CREDIT CARD NUMBERS, PASSWORDS, OR OTHER PERSONAL DATA.
  • 4. REFERS TO THE COPYING AND ARCHIVING OF COMPUTER DATA SO IT MAY BE USED TO RESTORE THE ORIGINAL AFTER A DATA LOSS EVENT.
  • 5. AN INDIVIDUAL WHO USES COMPUTER, NETWORKING OR OTHER SKILLS TO OVERCOME A TECHNICAL PROBLEM.
  • 6. TYPE OF UTILITY USED FOR SCANNING AND REMOVING VIRUSES FROM YOUR COMPUTER.
  • 7. TO PREPARE THE CHOSEN PARTITION ON THE DRIVE TO BE USED BY AN OPERATING SYSTEM BY DELETING ALL OF THE DATA1 AND SETTING UP A FILE SYSTEM.
  • 8. MALICIOUS LITTLE PROGRAMS CAN CREATE FILES, MOVE FILES, ERASE FILES, CONSUME YOUR COMPUTER'S MEMORY, AND CAUSE YOUR COMPUTER NOT TO FUNCTION CORRECTLY.
  • 9. RELATIVELY MINOR RELEASE OR VERSION UPGRADE TO AN EXISTING SOFTWARE PRODUCT THAT ADDS MINOR FEATURES OR CORRECTS BUGS.
  • 11. A SOFTWARE THAT IS INSTALLED ON A COMPUTING DEVICE WITHOUT THE USER'S KNOWLEDGE OR PERMISSION.

Notas do Editor

  1. BOOST
  2. clever or expert programmer
  3. clever or expert programmer
  4. clever or expert programmer
  5. clever or expert programmer
  6. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.