Computer Science-chapter 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

router

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

keyloggers

A type of spyware known as _________ can record the individual keystrokes of a user.

surge protector

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

cybercrimes

Actions ranging from creating viruses to disrupting computer networks are often referred to as:

countermeasure

Any step you take to ward off a threat is called a:

mission-critical

Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

zombies

Computers which are under the external control of a hacker are known as:

packets

Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

bandwidth

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

encryption

Many types of software and devices use _________ to scramble your data or communication.

cyberterrorism

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

protocols

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

backups

Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.

true

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

Fault-tolerant

_________ computers are able to continue their operation even when problems are present.

Redundant

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

Phishing

_________ involves luring individuals into entering personal information into a website controlled by the hacker.

spyware

_________ is a type of malware which is designed to report activity on your computer to another party.

Data mining

_________ is the discovery of new patterns or relationships between data.

wireless

_________ networks use radio signals that travel through the air to transmit data.

Strong

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Attenuation

_________ refers to the loss of intensity and clarity of the data signal being transmitted.

DDoS

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

repeater

A _________ is used to prevent attenuation when packets are traveling long distances.


Kaugnay na mga set ng pag-aaral

KINESIOLOGY FINGER & HAND JOINTS (EXTRINSIC AND INTRINSIC)

View Set

Phlebotomy chapter 8 (certification exam prep)

View Set

Chapter 2 Beginnings of English America/ Inquizitive

View Set

Milady Advanced Esthetics Chapter 3: Histology of the Cell & Skin

View Set

Immunology Lecture 8 Activation of the Immune System

View Set

Cellular Adaption, Injury and death

View Set