Removing one letter from each of the 5 words
(The 4 listed below and the title word) will allow the solver to rearrange the remaining letters into words related to malicious computer’s performance:
janitor, lawmaker, reward, roadblock.
The removed letters may be rearranged into a word related to connection that might cause faulty performance.