You are on page 1of 14

Install: place or fix (equipment or machinery) in position ready for use.

Uninstall- remove (an application or file) from a computer.


Shortcut Method- Shortcut keys are performed using the Alt key
(on IBM compatible computers), Command (on Apple
computers), Ctrl key, or Shift key in conjunction with another key.
The de facto standard for listing a shortcut is listing the modifier
key, a plus symbol, and another key.

Ctrl. C Ctrl. S

Ctrl. V Ctrl. Z

Ctrl. O
Desktop- A desktop computer is a computer that fits on or under
a desk. They utilize peripheral devices for interaction, such as a
keyboard and mouse for input, and display devices like a monitor,
projector, or television.
Task Manager- Task Manager, previously known as Windows Task
Manager, is a task manager, system monitor, and startup manager
included with Microsoft Windows systems. It provides information
about computer performance and running software, including name of
running processes, CPU and GPU load, commit charge, I/O details,
logged-in users, and Windows services. 
BUG- In computer technology, a bug is a coding error in a
computer program.
The correct usage is "a piece of software" or something in that vein. I prefer "a
program" or "a computer program" myself. Other alternatives are: an application, a
computer application, an app, a software tool.
BROWSER- a computer program with a graphical user interface
for displaying and navigating between web pages
REFRESH/ RELOAD-an act or function of updating the display on a
screen:
A popup window is a web browser window that is smaller than standard windows
and without some of the standard features such as toolbars or status bars.
A bookmark or electronic bookmark is a method of saving a web page's address.
While using most browsers, pressing Ctrl+D bookmarks the page you are viewing.
To bookmark a page using your mouse,
click the        (star) icon (or a similar symbol) to the right of the address bar.
Tab: In computing, "tab" has two different meanings.
It may refer to
1) a key on the keyboard or 2) a document header inside a window .
Trojan viruses are a type of malware that invade your computer disguised
as a real, operational programs.

With computers, infect describes an instance where malicious software is


installed onto a computer or other device without a user's knowledge. For
example, someone may install software on a computer that's infected with a
virus. Once installed, the program would work as the user intended.

•Antivirus software helps protect your computer against malware and cybercriminals. Antivirus
software looks at data web pages, files, software, applications traveling over the network to your
devices. It searches for known threats and monitors the behavior of all programs, flagging
suspicious behavior.

MALWARE: Software that is specifically designed to disrupt, damage, or gain


unauthorized access to a computer system.
Trojan viruses are a type of malware that invade your computer disguised
as a real, operational programs.

With computers, infect describes an instance where malicious software is


installed onto a computer or other device without a user's knowledge. For
example, someone may install software on a computer that's infected with a
virus. Once installed, the program would work as the user intended.

•Antivirus software helps protect your computer against malware and cybercriminals. Antivirus
software looks at data web pages, files, software, applications traveling over the network to your
devices. It searches for known threats and monitors the behavior of all programs, flagging
suspicious behavior.

MALWARE: Software that is specifically designed to disrupt, damage, or gain


unauthorized access to a computer system.

"Panda Burning Incense" is a famous virus spread on the Internet, named after the icon
is a cute panda. One reason the virus is difficult to deal with is that it has many variants.

You might also like