Ch. 8-10 Computer Concepts
IP address
the means by which all computers connected to the internet identify each other.
Unshielded twisted-pair cable
the most popular transmission media option for wire Ethernet networks.
Resolution
the number of data points it records for each image captured.
Sampling rate
the number of times per second a signal is measured and converted to a digital value.
Quarantining
the placement of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.
Phishing
the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.
Syncing
the process of updating your data so that the files on your cell-Smartphone and computer are the same.
P2P sharing
the process of users transferring files between computers.
MMS
allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.
Data plan
an Internet connectivity plan or text messaging plan.
Denial-of-service attack
an attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate user access.
Distributed denial-of-service attack
an automated attack that is launched from more than one zombie computer at the same time.
Hoax
an e-mail message or Web site that contains information that is untrue, and is published with the purpose of deceiving others.
Spyware
an unwanted piggyback program that downloads with the software you want to install from the Internet then runs in the background of your system.
Internet tablet
another type of very light, very portable device.
eReaders
devices that can display etext and have supporting tools, like note taking, bookmarks, and integrated dictionaries.
Cell phone
has evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device.
Digital signal processor
included in cell phones to handle the compression work.
Codec
is a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space.
SMS
is a technology that allows you to send short text messages over mobile networks.
Multipartite virus
literally meaning "multipart" virus; a type of computer virus that attempts to infect both the boot sector and executable files at the same time.
Tethering
makes sure that as long as you have a 3G signal, your computer can access the Internet even when it tells you there are no available wireless networks.
Pharming
planting malicious code on a computer that alters the browser's ability to find Web addresses and directs users to a bogus Web site.
Rootkits
programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.
Smartphone
require a data plan from the cell phone provider and extends the power of a cell phone.
Netbooks
run a fully featured operating system but weigh in at 2 pounds or less.
Portable media players
small portable devices (such as iPods) that enable you to carry your digital audio files around with you.
Microbrowser
software provides a Web browser that is optimized to display Web content effectively on the smaller screen.
Malware
software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering.
Antivirus software
software that is specifically designed to detect viruses and protect a computer and files from harm.
Pretexting
the act of creating an invented scenario to convince someone to divulge information.
Script
a list of commands that can be executed on a computer without user interaction.
Urban legend
a hoax that becomes so well known that it is accepted by society as true even though it is false.
Base transceiver station
a large communications tower with antennas, amplifiers, receivers, and transmitters.
Botnet
a large group of software applications that runs without user intervention on a large number of computers.
Backups
a backup is a copy of computer files that you can use to replace the originals if they are lost or damaged.
Packet sniffer
a computer hardware device or software program designed to detect and record digital information being transmitted over a network.
Trojan horse
a computer program that appears to be something useful or desirable, but at the same time does something malicious in the background without the user's knowledge.
Logic bomb
a computer virus that runs when a certain set of conditions is met, such as when specific dates are reached on the computer's internal clock.
Logical port blocking
a condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through the computer.
Image backup
a copy of an entire computer system, created for restoration purposes.
Gray-hat hackers
a cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.
Uninterruptible power supply
a device designed to power a computer from large batteries for a brief period during a loss of electrical power.
Wireless range extender
a device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity.
Surge protector
a device that protects computers and other electronic devices from power surges.
Biometric authentication device
a device that uses some unique characteristic of human biology to identify authorized users.
Packet filtering
a feature found in firewalls that filters out unwanted data packets sent to specific logical ports.
Data file
a file that contains stored data.
Program file
a file that is used in the running of software programs and does not store data.
Personal firewall
a firewall specifically designed for home networks.
VoIP
a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
White-hat hacker
a hacker who breaks into systems just for the challenge of it.
Black-hat hacker
a hacker who uses his knowledge to destroy information or for illegal gain.
encryption viruses
a malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.
Internet service provider
a necessity if you want to connect your Smartphone to the Internet.
GPS
a network of 21 satellites that constantly orbits the Earth.
Network address translation
a process that firewalls use to assign internal Internet Protocol (IP) addresses on a network.
Inoculation
a process used by antivirus software; compares old and current qualities of files to detect viral activity.
Worm
a program that attempts to travel between systems through network connections to spread infections.
Adware
a program that downloads on your computer when you install a freeware program, game, or utility.
Backdoor programs
a program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission.
Master boot record
a small program that runs whenever a computer boots up.
Packet
a small segment of data that is bundled for sending over transmission media.
Wireless markup language
a specially designed content designed for wireless devices, which is text-based and contains no graphics.
Digital rights management
a system of access control that allows only limited use of material that has been legally purchased.
Incremental backup
a type of backup that only backs up files that have changed since the last time files were backed up.
Scareware
a type of malware that is downloaded onto your computer and tries to convince you that your computer is infected with a virus or other type of malware.
Flash memory
a type of nonvolatile memory to store files.
Keystroke logger
a type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.
polymorphic virus
a virus that changes its virus signature every time it infects a new file.
Macro virus
a virus that is distributed by hiding it inside a macro.
Time bomb
a virus that is triggered by the passage of time or on a certain date.
Stealth virus
a virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.
e-mail virus
a virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.
Cybercrime
any criminal action perpetrated primarily through the use of a computer.
Piggybacking
connecting to a wireless network (other than your own) without the permission of the owner.
Analog-to-digital converter chip
converts your voice's sound waves into digital signals.
Digital convergence
the use of a single unifying device to handle media.
Telephony
the use of equipment to provide voice communications over a distance.
Drive-by download
the use of malicious software to attack your computer by downloading harmful programs onto your computer, without your knowledge, while you are surfing a Web site.
Spam
unwanted or junk e-mail.
Bluetooth
uses radio waves to transmit data signals over short distances.