Final Exam Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is ransomware?

A computer virus that encrypts a user's storage, until the victim pays money to unlock it.

What is FAT?

A directory that keeps track of every file's location.

What are folders, sub folders and folder sizes used for?

A folder is a logical container that can be utilized to store groups of related files. A subfolder is merely a folder residing within a folder. They don't really occupy storage space. They are used to better organize files.

What is a network license?

A network environment, allows multiple users to access the software at the same time (share) from a central location such as a server. You would purchase licenses based on the number of users simultaneously accessing the software from the server.

What is virtual memory?

A portion of the hard drive designated to function as additional RAM in case of a shortage.

How are drive letters assigned to storage drives?

A represents your first floppy drive. B is traditionally reserved for a second floppy drive. C represents your hard drive. Assigned in which the drives appeared.

What is spoofing? Give examples.

A technique intruders use to make their network or Internet transmission appear legitimate. Email Spoofing: email headers are altered to make an email appear to be sent from another source. When the recipient opens the email, they may be introducing Malware into their computer. IP Spoofing: an IP address is altered and forwarded to a website masquerading to be legitimate. Once a user connects to the illegitimate website, they may divulge compromising information or download attachments containing Malware.

What is a boot sector virus?

A very damaging virus that attacks and modifies the boot sector where the files that start your computer are stored(boot up files). If boot up files are destroyed, you can't boot or start the computer.

What is a virus?

A virus is destructive software designed to damage files or disrupt a computer's normal operations.

What is a file virus?

A virus that attaches itself onto an application program and thereafter is copied onto other files. Infection is disseminated through contact, much like a human virus.

What is a payload?

A virus' intended damage; Some payloads are mere pranks, others can be extremely damaging.

What are the two types of spyware?

Adware: Popups providing commercial advertisement. Solicitations are based on the content of your "Cookies" folder. "Cookies" determine user preferences based on visits to websites. Adware is often linked to more malicious Malware. Keyloggers: spyware that records or captures a user's keystrokes as a means of obtaining passwords, account numbers, usernames, etc.This can eventually lead to identity theft.

What are the extensions for software files?

.EXE, .COM, .BAT, .DLL, .SYS, and .INI

What is a hardcopy?

A permanent or tangible output obtained by a printer.

What is a softcopy?

A temporary output channeled to a monitor or speakers.

What is a retro virus?

Bad, retro viruses are designed to destroy or disable anti-virus software; computer becomes vulnerable to Malware threat.

Identify user interfaces.

Command line Prompted Menu-driven Graphical User (GUI) Touch/Swipe Oral

Identify 4 actions taken during software installation.

Copied Desktop shortcuts Menus are modified Windows registry is updated

What is malware?

Destructive/malicious software.

Give examples of legacy devices.

Floppy diskettes.

What is cloud storage?

Free voluminous storage provided by One Drive, Google Drive, etc. it is accessible anywhere you have access to the internet.

Why is Charles Babbage recognized?

He devised the concept of the IPOS cycle.

What are the concepts of the IPOS cycle?

Input Process Output Storage

What are the uses of application software?

It is used to perform any action.

What system do platforms pertain to?

Microcomputers are identified by platform. The platform identifies the computer's architecture.

What does compressing a file do and why is it necessary?

Because of the large sizes of most software files, these files normally have to be compressed. Compressed files are identified by their .ZIP extension., Files transport faster.

How do firewalls work?

Can either be software or hardware. A table is created to track and identify only sites recognized as friendly, all others are blocked.

Why are files stored in binary?

Characters will be stored as 1s and 0s on a byte because all a computer understands is binary code.

How does virtual memory work?

Data and software in RAM not being used is offloaded to the paging file. This allows more space to become available in RAM. When content in the paging file is needed back in RAM, it is swapped back to RAM and something else moves to the paging file in its place (a swap).

What is DoS and DDoS? What is the harm?

Denial of Service (DoS) attack is an assault on a computer to disrupt access to an Internet service (web, email). A Zombie bombards a network with useless data messages or network traffic, thus slowing down the network and preventing other users from accessing network resources. A more severe attack is a DDoS

How do web apps differ from desktop apps?

Desktop applications are installed on a personal or work computer and web applications can be accessed through the internet.

What is the difference between collapsed and expanded folders?

Expanding a folder means the arrowhead that allows you to view all additional subfolders (the down arrow) has been clicked. Collapsing a folder means the arrowhead that hides the displayed subfolders has been clicked.

What are the virus categories?

File Boot sector Macro Ransomware

What does software piracy involve?

Illegal duplication of software.

What are the two general printer categories? Identify and define them.

Impact printers characteristics: make physical contact with paper. Non-impact printers characteristics: use lasers or ink nozzles to form images and characters on paper.

What is phishing?

Internet scams requesting personal information such as a social security number or bank account number, the user provides the information voluntarily. Many successful phishing scams have contributed to the growth of identity theft.

How does a trojan horse differ from a regular virus?

It copies itself onto a legitimate program and hides until the legitimate program is activated. Once the legitimate program is active, the Trojan horse appears and delivers its payload. Unlike a virus, a Trojan horse is not replicated.Trojans can be as equaling damaging as viruses.

What is the significance of the analytical engine?

It was a computing device (a large calculator) that followed the direction or instructions provided by a human operator. It introduced the concept of the IPOS cycle.

What technology is used for storage devices?

Magnetic storage, optical storage, solid state storage, and cloud storage.

What is spyware and what is the harm in it?

Malware that secretly gathers personal and confidential information from a computer, often times for illegal gain. Much if not all spyware comes from surfing the Internet.

What does it mean when something is backwards compatible?

Newer versions of application software recognizes files created in older versions, but not vice versa.

What is a bot?

Programs that perform repetitive tasks, usually on a network. Dissemination of SPAM or Denial of Service (DoS) attacks are often the work of bots operating through Zombies.

What does scandisk remedy?

Rebates files in damaged areas onto secrue areas.

Name browsers.

Safari, Firefox, Opera, Chrome, Internet Explorer, and Edge.

What are the 5 different computer systems?

Super computer Mainframe Minicomputer Multiuser Micro or Desktop

Why are software updates necessary?

Supplemental codes or instructions added to a program to correct a program flaw, add improvement, or to add new features.

Utilities - system or application software

System software is for computer use.

What are clones or compatibles?

Systems manufactured by someone other than IBM but which contain a similar architecture as the IBM PC.

What is the purpose of a compiler?

Takes Source language (English) and converts to Object (Computer) Language.

What hardware is NOT peripheral?

The CPU and RAM.

What is the preferred browser to enter the deep/dark web?

The Deep Web uses a browser called "TOR", activity using TOR is difficult to trace, that's what allows crime to thrive.

What is hardware?

The computer's physical equipment (there are devices associated with every component of IPOS). The hard drive, CPU, ram chips, keyboard, mouse, motherboard, Monitor etc.

What is output?

The end result of processing, raw data provided by an input device has now been transformed into useful information and is displayed on an output device. The CPU and software jointly transform the raw data into useful information.

What drive has a recycle bin? What happens to files that are sent here? Can they be recovered?

The hard drive is the only drive that has a recycle bin. The files are deleted. You can recover them and they will be sent to their last location.

What is input?

The step that initiates processing, raw data to be processed is entered into the computer using an Input Device. Critical first step in processing. GIGO - acronym that stands for "garbage in garbage out.

Contrast secondary storage media.

There are different types which include hard drives, flash drives, DVD discs, floppy diskettes.

Contrast storage technologies, what are the advantages and disadvantages?

There are magnetic, optical, and solid state. Magnetic- slowest access to recorded files, least expensive, less durable, portable, large volume. Solid- quickest access to recorded files, most expensive when it comes to byte for byte, more durable, compact, portable. Optical- more durable, recorded with lasers, slow read and write time, greater storage capacity, data can be retained for up to 30 years.

What is a site license?

There is permission to make multiple copies of a given piece of software, typically at a discount when compared to the single user license-typical in an environment like a business or school where many copies of the same program are necessary in a lab or in offices.

What is a single user or end user license?

These are only one user at a time may use the software, typical for the average home consumer. Depending on the terms, you may be allowed to make personal copies.

What do enablers do?

These are organizations who promote the creation and spreading of viruses, usually outside the U.S. These organizations can mainly be found on the Internet. For a small fee you can buy a "virus kit" which teaches you how to create viruses and avoid detection. This is illegal within the U.S.

What are the terms associates with cyber criminals?

These computer vandals are referred to as "hackers", "crackers", "cyber-extortionists", "script kiddies," "cyberterrorists"

What are programming languages for?

They are for users ONLY, not for computers.

What are browsers for?

They are needed to access the Internet.

What does the SPA do?

They enforce software license terms. The SPA can levy fines and bring charges against an organization or individual.

What are the uses of operating systems?

They manage computers hardware, software, memory, and processes. This first

What does a disk defragmenter do?

They rearrange the layout of files on hard disk for faster access. They get fragmented by a head crash.

Does a computer use source code or object code?

They use object code. Source code is for programmers.

What are the consequences of a head crash?

This can result in the loss of access to all data.

Why is binary code necessary?

This electronic language is the only language a computer understands.

What does formatting do?

This establishes addresses and a file allocation table (FAT), which is like a directory that keeps track of every file's location.

What will converting a file to a PDF do"

This file format is a universal one that permits anyone to open and read the file, even if they don't have the source application used to create the file. They cannot be edited.

What does a backup & restore do?

This is a utility that automates the process of making back-ups. Can back-up an entire drive or just select content. Backup & Restore can be found in Control Panel.

What are multiuser systems?

This is when there is one central computer called a "host", all users are attached to it sharing its centralized processor(s), RAM, software, and storage drives. The host is capable of accommodating multiple users and perform processing tasks.

What is process?

This occurs in the System Unit - the transformation or conversion of raw data into useful information using software, two chips, the CPU & RAM are directly involved, their role is indispensable and the essence of processing. These 2 chips are responsible for all the processing that occurs on a computer.

What is a macro virus?

This virus disrupts macros or program scripts within your software. Most large programs consist of multiple macros. The greatest number of viruses that exist today are of the "macro"variety.

What is spam and what is the harm in it?

Unsolicited junk mail disseminated through email, often times linked to more malicious Malware. About 80% of email circulated worldwide, is SPAM. SPAM blockers or filters generally prevent SPAM from entering your Inbox. SPAM dissemination is often the work of a Zombie executing a bot.

What does a worm do?

Upon entry into a computer, worms replicate rapidly within a computer's memory occupying all the available space. Basically, your computer freezes and can no longer function because all memory space is occupied. Worms clog your system's memory rendering your computer useless. Worms are especially harmful when infiltrating network because the worm is spread to computers throughout the network or even through the Internet.

What are the guidelines for assigning names to data files?

Users are responsible for assigning names to data files. File naming conventions is the term that identifies the guidelines for assigning data file names. The guidelines vary according to your operating system.

What is storage?

Usually refers to secondary storage, that is, the permanent placement of information on a device like a disk, but it can also refer to temporary storage in some form of memory, such as main memory (RAM) or short-term storage such as registers and cache.

What are VDPs? How do they work?

Virus detection programs (VDPs) detect and in most cases remove known viruses, the keyword here is known, with so many new viruses appearing daily, it's impossible to have a VDP that's going to recognize every virus. VDPs must be updated frequently to keep abreast of current or newly created viruses.

How are immediate viruses activated?

Viruses that instantaneously activate (deliver the payload) upon entry into your computer.

How are dormant viruses activated?

Viruses that remain inactive until activated by a specific time or event.

What are web filters?

Web filtering software are programs that restrict access to certain material on the Web (phishing filters, popup blockers, others). Filters can be turned on while activating settings in your web browsers.Filters can also be activated to protect against"high-risk" websites where Malware exposure is prevalent.

What is a head crash?

When the mechanical components of the disk drive are no longer functioning thus making it impossible to retrieve data.

What is the criterion for selection secondary storage media?

You should consider the following factors when selecting a secondary storage media: 1. Capacity 2. Hard drives provide the greatest capacity of any PC media, flash drives and DVD disks provide the greatest capacity of portable or mobile media. 3. Access time 4. Cost 5. Durability 6. Versatility

What does SPA stand for?

Software Publishers Association.

What is binary code?

The electronic language that a computer understands.

How many device drivers does a computer need?

The number always depends.

How do probes work?

The term used to identify unauthorized intrusion detected by a firewall.

How does a disk cleanup work?

This is when expendable files are identified and a caption to delete is provided.

When do you encounter EULA?

When you are installing software.

What is CAPTCHA?

"Completely Automated Public Turing" test. Requires that a user acknowledge they are not a Robot; The test is intended to detect Zombies from humans.

What is SSL?

"Secure Sockets Layer" is a computing protocol that ensures the security of data sent via the Internet by using encryption.

Identify and define byte units.

1. Kilobyte- one thousand bytes 2. Megabyte- one million bytes 3. Gigabyte- one billion bytes 4. Terabyte- one trillion bytes 5. Petabyte- one quadrillion bytes 6. Exabyte- one quintillion bytes.

Identify and define access times.

1. Millisecond- 1/1000 of a second 2. Microsecond- 1 millionth of a second 3. Nanosecond- 1 billionth of a second 4. Picosecond- 1 trillionth of a second

How does a rootkit work?

A Rootkit Is a program that hides in a computer and allows a Cracker from a remote location to take full control of the computer, usually to perform nefarious acts.

What is botnet?

A botnet is a Zombie army, several compromised computers operating on a network or the Internet executing bots.

How does a zombie work?

A computer that's been compromised and is being controlled remotely, usually as a result of Rootkit infection. The computer's owner is unaware their computer has been compromised.

What are the differences between operating systems?

x

What software is involved in the Boot process?

x


Conjuntos de estudio relacionados

AP Computer Science Project Stem Chp. 1

View Set

SLS Strategies For Success Final (Chapter 5-7)

View Set

Assemblies and the Global Assembly Cache

View Set

pediatrics week week 13 chapters 22,26,and 28

View Set

CHM Exam 4 (Chapter 3) Study Guide

View Set

POLS 2305 - American Gov - Chapter 12 Political Parties

View Set

The Art Of Public Speaking: Stephen E. Lucas

View Set