For Daily Job Alert Join Our Whats App Channel
For Free Study Material Join Our Telegram Channel

Important Computer Terms to Remember


It is a computer code that can make multiples of it and spread from one computer system to another system. A virus has the capacity to corrupt or delete data on your system and it can utilise an email program to spread the virus to other computers.In the worst case scenario, it can even deleteeverything on your hard disk. The purpose of it is to disrupt the operation of the computer or the program.

Antivirus Software:

Antivirus Software is used to scan the hard disk to remove the virus from them. Some of the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.


Malware is the short form of malicious software. This software is used to disrupt the operations of a system, gather information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software.

Computer Worm:

A worm is a malware program which creates multiples of its self to spread to other systems. Worms often use a computer network to spread itself. The rely on security failures on the computer which they have targeted to access it.

Trojan horse:

Trojan horse is a program that promises to remove viruses from your computer system but instead introduces viruses onto your computer. The term Trojan is taken from the Greek story of the Trojan War.


Authorization is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular. More formally, “to authorise” is to define an access policy.


When a single piece of data or a person is checked to confirm whether it is of true value, the act is known as authentication. The identity of an entity is confirmed by cross-checking the documents which prove their identity and on achieving successful results access is granted. Authentication often involves verifying the validity of at least one form of identification.


Hacker is a one who with the help of his or her computer knowledge takes control of the computer systems of others to obtain valuable information or to do damage.


The attempt to obtain information like usernames, passwords or details of credit card and sometimes money (indirectly) by promising to be a trustworthy entity in an electronic communication is popularly known as phishing.

Spoofing Attack:

A set of actions in which a person or program projects itself as something else successfully by providing false data and by doing so gaining an unfair advantage is known as spoofing attack.

Maths Topicwise Free PDF >Click Here To Download English Topicwise Free PDF >Click Here To Download
GK/GS/GA Topicwise Free PDF >Click Here To Download Reasoning Topicwise Free PDF >Click Here To Download
Banking Topicwise Free PDF >Click Here To Download DI Topicwise Free PDF >Click Here To Download
All Subject Topicwise Short Tricks >Click Here To Download Static GK & Awareness Topicwise Free PDF >Click Here To Download
Please Support us by Joining Below Groups & Like Our Pages we will be very thankful to you.
Facebook   Facebook Page :
Facebook Group :
Telegram Official Channel :
Current Affairs Channel :
UPSC Channel :
SSC Channel :
Banking Channel :
RBI Group :
Railway RRB Channel :
IT Officer Group :
Insurance Group :
Job Alert Channel :
Youtube  Click Here To Subscribe Now



Team GovernmentAdda

Share & Support Us



Please enter your comment!
Please enter your name here