update n.  e Aktualisierung (-en), e Änderung (-en), s Update (-s)   last update (on)  letzte Änderung (am), user  r Anwender, r Benutzer, r Nutzer, r User   user I.D. For example: We’ve only covered the tip of the iceberg as far as cyber security terms, but this will get you started. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network. A type of malware that functions by spying on user activity without their knowledge. ), s Thema (topic), submit (v.)  absenden, senden, einen Befehl absetzen  submit button r Submit-Knopf, r Sendeknopf. ), spell check (a document)  e Rechtschreibung (eines Dokuments) prüfenspell-checker  e Rechtschreibhilfe, r Rechtschreibprüfer (-), start (program) (v.)  starten  he starts the program er startet das Programm  restart neu starten, subject (re:)  r Betreff (Betr. The Windows in the background are not active. The words are in alphabetical order. These instructions are compiled into a package that users can install and use. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network. Take the steps now to ensure that you and your business are protected – knowledge is power! ), print cartridge(s)  e Druckpatrone(n), e Druckerpatrone(n), e Druckkopfpatrone(n), search engine  e Suchmaschinesearch form  e Suchmaske, shortcut s Schnellverfahren, r Shortcut  as a shortcut im Schnellverfahren, shut down, close (application)  beendenshut down (computer)  herunterfahren (...und ausschalten)  the computer is shutting down der Computer wird heruntergefahren  restart neu starten, spam, junk mail (n.)  die Werbemails (pl. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets). German Words Related to Computers . answer, reply (n.) e Antwort, e-mail abbrev. Computer Full Form with its parts full forms by alphabetically mentioned are as under. ), log in/on (v.)  einloggen  he's logging in er loggt ein  she can't log in sie kann nicht einloggen, link (to) (v.)  verweisen (auf) accus., einen Link angeben, mailbox  e Mailbox (computers and email only), mailing n.  s Mailing (mass mailing or mail shot), mark (as read) v.  (als gelesen) markieren, memory (RAM)  r Arbeitsspeicher, r Speicher  amount of memory e Speicherkapazität  insufficient memory ungenügender Speicher  not enough memory to load image nicht genug Speicher, um Bild zu laden, menu (computer) s Menü  menu bar/strip e Menüzeile/e Menüleiste, message (email)  e Nachricht, e Mail (eine Mail)  email messages  die Mails (pl.) The circuitry on a Macintosh computer than controls power-related functions. A malicious application or script that can be used to take advantage of a computer’s vulnerability. See the Wi-Fi Alliance site for more. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. We tried to cover all Full Forms related to computer parts. VAY-LAHN) - Wireless LAN (local area network)Note: In the U.S. and many other countries, "Wi-Fi" is used as a synonym for WLAN, although technically the term is a registered trademark related to the WECA (Wireless Ethernet Compatibility Alliance) organization that developed the Wi-Fi standard and the Wi-Fi logo. MAC - This is an abbreviation for Macintosh, which is a type of personal computer made by the Apple Computer company. 1. die Mails (pl.) Read-only memory that is programmed after manufacture. Unfortunately, as long as computers exist, we are at risk of having our digital data compromised and manipulated. A piece of malware that can replicate itself in order to spread the infection to other connected computers. Befolgen Sie die Anweisungen auf dem Bildschirm. The most dangerous consequence of the popularity of deepfakes is that they can easily convince people into believing a certain story or theory that may result in user-behavior with a bigger impact as in political or financial. It is the main program that runs on a computer and begins automatically when the computer is turned on. Every industry has its own set of jargon, and computer science is no exception. When speaking in cyber security terms, the differences in hacker “hats” refers to the intention of the hacker. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests. This glossary of computer hardware terms is a list of definitions of terms and concepts related to computer hardware, i.e. Common forms include: viruses, trojans, worms and ransomware. 4 Browser Software, such as Microsoft Internet Explorer, used to find information on the Web. An acronym that stands for distributed denial of service – a form of cyber attack. tag n.  s Tag ("HTML tag" - not to be confused with r Tag = day), text  r Text   text box  r Textkasten, e Textbox   text field  s Textfeld (-er), text message  r SMS (see "SMS" for details), tool  s Tool (-s), s Werkzeug (-e)toolbar  e Toolbar (-s), e Toolleiste (-n), transfer, download v.  herunterladen (email, files), transfer, move (to a folder)  verschieben. new messages  neue Mails (pl.) A set of programs that tell a computer to perform a task. Computer Science: Abbreviations - In this chapter, we will discuss the different abbreviations in Computer Science. system  s Systemsystem requirements  Systemvoraussetzungen pl. Database terms - Internet terms - Network protocols - Network ports - Security terms: Top 10 network terms; Class A Download Network Mesh topology Ring topology E-mail Internet Bus topology Hub Communication device. turn on, switch on  einschalten   Turn on your printer. Computer Terms Dictionary – Developed by the Tips4pc community. Active Window: In the Windows Operating system an active window is the current window that you are working on. Schalten Sie den Drucker ein. sort messages  die Mails sortieren  unread messages  ungelesene Mails (pl. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. 25 Cyber Security Terms That Everyone Who Uses A Computer Should Know, 10 Most Important Cyber Security Tips for Your Users, Law Firms Are Targets For Hackers, Cybersecurity Experts Say, Due to COVID-19, Cybint is offering free online training to organizations, contact us to learn more >>, Former Head of the Israeli Cyber Defense Directorate Joins Cybint’s Advisory Board, Live Webinar: Inside a Hacker’s Mind – How to Spot the Weakest Link in an Organization. Glossary of Computer and Internet Terms for Older Adults This glossary for older adults was prepared by the National Institute on Aging. An audio or video clip that has been edited and manipulated to seem real or believable. PS/2: Personal System/2. For example, your computer is usually part of a domain at your workplace. Another word for computer. A. But, if you could nail long division in the 4th grade, then you can learn cyber basics that will get you pretty far in your own personal security as well as your company’s. 25 Cyber Security Terms That Everyone Who Uses A Computer Should Know July 23, 2020 / Devon Milkovich The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. ThoughtCo uses cookies to provide you with a great user experience.