Term
|
Definition
Short for binary digit; taking the form of either a one or a zero, it is the smallest unit of information on a machine. |
|
|
Term
|
Definition
A feature that allows the user to designate favorite web sites for fast and easy access. |
|
|
Term
|
Definition
|
|
Term
Central Processing Unit(CPU) |
|
Definition
The main chip within the computer; also referred to as the brain of the computer. This microprocessor chip handles most of the operations (code and instructions) of the computer. |
|
|
Term
|
Definition
A group of sectors in multiples of two; typically the minimum space allocated to a file. |
|
|
Term
|
Definition
Files placed on a computer from a visited web site; they are used to track visits and usage of that site. |
|
|
Term
|
Definition
The area that begins at the end of the last sector that contains logical data and terminates at the end of the cluster. |
|
|
Term
|
Definition
Hardware or software designed to protect against intrusions into an internet network. |
|
|
Term
|
Definition
Slang term for an unauthorized computer or network intrusion. |
|
|
Term
|
Definition
Typically the main storage location within the computer, consisting of magnetic platters contained in a case. |
|
|
Term
|
Definition
The physical components of a computer: case, keyboard, monitor, motherboard, RAM, HDD, mouse, and so on. Generally speaking, if it is a computer component you can touch, it is hardware. |
|
|
Term
|
Definition
Portions of visited web pages placed on the local hard disk drive to facilitate quicker retrieval once revisited. |
|
|
Term
|
Definition
An accounting of web sites visited. Different browsers store this information in different ways. |
|
|
Term
|
Definition
Areas of files and disks that are typically not apparent to the computer user (and often not to the operating system), but contain data nonetheless. |
|
|
Term
Message Digest 5(MD5)/Secure Hash Algorithm(SHA) |
|
Definition
A software algorithm used to "fingerprint" a file or contents of a disk; used to verify the integrity of data. In forensic analysis it is typically used to verify that an acquired image of suspect data was not altered during the process of imaging. |
|
|
Term
|
Definition
The main system board of a computer (and many other electronic devices) that delivers power, data, and instructions to the computer's components. |
|
|
Term
|
Definition
Software that allows the user to interact with the hardware and manages the file system and applications. |
|
|
Term
|
Definition
A contiguous set of blocks that are defined and treated as an independent disk. |
|
|
Term
|
Definition
The area beginning at the end of the logical file and terminating at the end of that sector. In some older operating systems this area is padded with information contained in RAM. |
|
|
Term
Random-Access Memory(RAM) |
|
Definition
The volatile memory of the computer; when power is turned off, its contents are lost. Programs and instructions are loaded into RAM while they are in use. |
|
|
Term
|
Definition
The smallest unit of data addressable by a hard disk drive, generally consisting of 512 bytes. |
|
|
Term
|
Definition
A set of instructions compiled into a program that performs a particular task. |
|
|
Term
|
Definition
A file or defined space on the HDD to which data is written, or swapped, to free RAM for applications that are in use. |
|
|
Term
|
Definition
Files temporarily written by an application to perform a function. |
|
|
Term
|
Definition
The area of the HDD that the operating system (file system table) sees as empty (containing no logical files) and ready for data. Simply stated, it is the unused portion of the HDD, but is not necessarily empty. |
|
|
Term
|
Definition
All data that the operating system is presently aware of, and thus is readily accessible to the user. |
|
|