CSCI 1145 mid term review chap 1-5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Chap 5 q. 1

1. Digital security risk is any event or action that could cause a loss of or damage to computer or mobile device hardware, software,data, information, or processing capability. Computer crime- Any illegal act involving the use of a computer or related devices. Cybercrime- online or internet-based illegal acts such as distributing malicious software or committing identity theft. Crimeware- software used by cyber-criminals

Chap 3 q. 5

A processor, also called CPU (central processing unit), is the electronic component that interprets and carries out the basic instructions that operate a computer. Memory consists of electronic components that store instructions waiting to be executed and data needed by those instructions.

Chap 1 q. 6 Server

A server is a computer dedicated to providing one or more services to other computers or devices on a network. The services a server provides are storing content and controlling access to hardware, software, and other resources on a network.

Chap 3 q. 13 Describe the purpose and functions of server. Differentiate among rack, blade, and, tower servers.

A server is a computer that is used to provide one or more services to a different computer or device. A server rack is server that is in a slot on a metal frame which has different servers on different slots. A blade is a single circuit blade which can hold many different blades. A tower is a server that is built into a tower/ cabinet.

Chap 3 q. 15 Define the terms, terminal and thin client. List the advantages of a thin client.

A terminal is a computer that allows the user to send or receive information from a host or server. A thin client has a limited amount of capabilities and run programs on the internet.

Chap 5 q. 5

A botnet, or zombie army, is a group of compromised computers or mobile devices connected to a network, such as the Internet, that are used to attack other networks, usually for nefarious purposes. A zombie is a compromise computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider. A bot is a program that performs a repetitive task on a network.

Chap 1 q. 24 Browser and purpose of search engine.

A browser is a software that enables users that have an internet connection to have access to different webpages on a computer, mobile device, or other electronics. A search engine is used to find specific information on a topic such as photos, music, videos, or text.

Chap 4 q. 45 . ​Describe the disk defragmentation process

A disk defragmenter is a tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.

Chap 2 q. 10

All -in -one desktop (AIO)

Chap 5 q. 2 Differentiate among hackers, crackers, script kiddies, cyber extortionists, and cyberterrorists.

Hackers - claim the intent of their security breaches is to improve security Crackers- has the intent of destroying data, stealing information, or other malicious action Script kiddie- has the same intent as a cracker but doesn't have the technical skills and knowledge Cyberextortionist- someone who demands payment to stop an attack on an organization's technology infrastructure Cyberterrorist- someone who uses the internet or network to destroy or damage computers for political reasons

Chap 1 q.37 Define the term, hotspot.

Hotspot: wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data

Chap 1 q. 19 Cloud storage

Internet service that provides remote storage to computer users. Types of services offered by cloud storage include public, private, and hybrid services.

Chap 1 q. 13 Data

Data is a group of unprocessed information while information is a group of data processed in a meaningful way to the user. Data is an input and information is an output therefore information is dependent on data. Some examples of data are numbers, videos, audio, and images. Some examples of information is data that possess context, relevance,and purpose like a cash receipt.

Chap 4 q. 19

Databases are better for long-term storage of records that will be subject to changes. Databases have a far greater storage capacity than spreadsheets. If your spreadsheet exceeds 20 columns and/or 100 rows, chances are it would be better for you to use a database.

Chap 5 q. 6

DoS attack is not to steal information but to slow or take down a web site. The attackers' motivations are diverse, ranging from simple fun, to financial gain and ideology

Chap 3 q. 37 Define the term, backward compatible.

It means they support older USB devices as well as newer ones.

Chap 1 q. 28 Malware

Malware, short for malicious software, is software that acts without a user's knowledge and deliberately changes the computer or mobile device's operations. ● Use virus protection software ● Use a firewall ● Be suspicious of all unsolicited email and text messages ● Disconnect your computer from the Internet ● Download software with caution ● Close spyware windows ● Before using any removable media, scan it for malware ● Keep current ● Back up regularly

Chap 1 q.17 Memory

Memory is a component in your computer that allows for short term data access. Storage is the component in your computer that allows for long term data access.

Chap 2 q. 19

Personal Digital Assistant Tablet PCs Smartphones ● Tablet PCs ● Apple iOS ● Google Android ● Windows Phone ● Palm OS ● Symbian OS

Chap 3 q. 42 List methods of securing against hardware theft and vandalism.

Physicalaccesscontrol.​Putthehardwareinasafeplaceandsecureitbylockingthe place and protect the equipment. - Real time location. S​ ystem of tracking and identifying the location of high-risk or high-value items. - Install alarm systems. W​ hen someone breaks into the safe room at a time where he is not allowed to and tries to steal or break hardware for example, the alarm will let the security forces know. - Use cables to lock computers to stationary objects. ​That way, it will not be easy to move the computer. - Install a mini security system. ​Same as the alarm system.

Chap 3 q.3

Protection against malware infections - have strong passwords, log out of websites when you're done, carefully read emails, use firewalls

Chap 2 q. 23 Distinguish between push and pull notifications

Push- a message that initiates from the sending location without a request from the receiver Pull- receiver requests information from the sending location

Chap 3 q. 45 Identify the causes and types of repetitive strain injuries. List symptoms of CVS.

RSI: tendonitis and carpal tunnel syndrome -from repeated or forceful bending of the wrist CVS: condition that affects eyesight -sore, tired, burning, itching or dry eyes -blurred or double vision -headache or sore neck -Difficulty focusing on screen image -color fringes/ after images when looking away -increased sensitivity to light

Chap 3 q. 44 Describe the purposes of surge protectors and UPS devices. Explain the purpose a fault-tolerant computer.

Surge Protectors: uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment. UPS: device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. UPS connects your computer and a power source Fault-tolerant computer: has duplicate components so that it can continue to operate when one of its main components fails.

Chap 1 q. 30 Explain physical and behavioral health risks associated with using computers.

Technology addiction: when someone becomes obsessed with using technology. Technology overload: individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.

Chap 5 q. 12

Unauthorized use of a network or computer is when it is used without permission. An example of this would be an employee at a company using company equipment, computers etc. to send out personal emails, online shop, or browse social media accounts.

Chap 3 q. 43 Define the terms, undervoltage and overvoltage, and explain how each can damage a computer or data.

Undervoltage: occurs when the electrical supply or voltage drops often defined as more than 5%, below the normal volts; Can cause data loss but generally does not cause equipment damage Overvoltage(power surge):occurs when the incoming electrical supply or voltage increases, often defined as more than 5%, above the normal volts. - A momentary overvoltage, occurs when the increase in power lasts for less than one millisecond. Uncontrollable disturbances such as lightning bolts can cause spikes. Overvoltages can cause immediate and permanent damage to hardware.

Chap 4 q. 18

Worksheet- A spreadsheet or worksheet is a file made of rows and columns that help sort data, arrange data easily, and calculate numerical data Function-is a type of procedure or routine. Some programming languages make a distinction between a function, which returns a value, and a procedure, which performs some operation but does not return a value.

Chap 5 q. 8 Spoofing

a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Chap 2 q. 9 Considerations everyone should keep in mind while purchasing a mobile computer is:

a. Amount of cost a user is willing to spend b. What features it has c. Protection plans and usage Built-in ports and slots are important for when you wish to transfer photos and connect devices

Chap 2 q. 8 Steps to protecting yourself from webcam spying:

a. Cover your webcam with a sticker. b. Enable webcam protection c. Use an Antivirus with real-time protection

Chap 4 q. 46 Compressed files sometimes are called ​zipped​ files

● Zipped files ○ Helps compact multiple files into one ○ Compression reduces storage ○ Easier process with needing to attach multiple files

Chap 5 q. 11

firewall- software that protects a network's resources from different networks like the internet. Proxy server- an outside server that controls what comes in and out of the network, and screens incoming and outgoing messages. To set up a personal firewall, 1.locate your computer's firewall options in the security settings, and disable one if it is already running 2.run the personal firewall 3. Make sure it's enabled 4.review the settings for incoming and outgoing rules 5.back up or export a current list of outgoing and ingoing rules 6. Adjust new rules to avoid other devices to cases your computers 7. Adjust the outgoing rules to allow only desired programs and devices to your network 8.save settings 9. Test the firewall using the internet, and see if browsing functions properly

Chap 5 q. 7 Backdoor

program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

Chap 1 q. 33 define the term operating system. List popular operating systems for computer and mobile devices

​An ​operating system​ (OS), in its most general sense, is software that allows a user to run other applications Computer- Microsoft, windows and Linux Mobile- android and ios

Chap 5 q. 29 Unencrypted data is called _​______; encrypted data is called _​______.

​plain text, cipher text​

Chap 5 q. 31 Define these terms: digital signature, digital certificate, and secure site. Digital signature

-​ an encrypted code that a person, website, organization attaches to an electronic message to verify the identity of the message sender Digital certificate-​ is a notice that guarantees a user or a web site is legitimate Secure site-​ A web site that uses encryption techniques to secure its data

Chap 2 q. 48 List symptoms of technology addiction. Define the term, technology overload. Technology Overload is when you feel stressed or deprived of technology and you need to manage.

-Craving computer time - Overjoyed when using a computer or mobile device - Unable to stop using technology - Irritable when you can't use it - Neglects family or friends - Causes problems at work or school.

Chap 4 q. 39 A virus__ is a known specific pattern of virus code. Differentiate between spyware and adware​.

- A "virus signature" - Adware: ​a program that installs an additional component that feeds advertising to your computer (pop ups). Some hijacks your browser start or search pages, redirecting you to sites other than intended. ​Adware remover is a program that detects and deletes adware - Spyware:​ monitors computer and internet use. It can record keystrokes or screenshots, sending them to remote attackers who can get user IDs, passwords, credit card numbers, and other sensitive information.​Spyware remover is a type of program that detects and deletes spyware and similar programs

Chap 5 q. 3 List common types of malware.

- Adware - Ransomware - Rootkit - Spyware - Trojan horse - Virus - Worm

Chap 5 q. 39 Describe technology ethics, information accuracy, intellectual property rights, copyrights, and codes of conduct.

- Technology ethics​ - a field of study that seeks to understand and resolve moral issues that surround the development and practical application of mechanical and electronic technology - Information accuracy​ - quality of being true or correct, even in small details. If someone or something performs a task, for example hitting a target, with accuracy, they do it in an exact way without making a mistake. - Intellectual property rights​ - A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for intellectual property is to encourage innovation without the fear that a competitor will steal the idea and / or take the credit for it. - Copyrights​ - a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, videos, movies, music and computer programs. The copyright holder is often a company or corporation. - Code of conduct​ - collection of rules and regulations that include what is and is not acceptable or expected behavior. A handbook of an organization setting forth rules for behavior by members is an example of a code of conduct.

Chap 4 q. 40 ​Identify ways to avoid malware when using a mobile device.

- To avoid malware you can download malware removers that detect and delete spyware,adware and other types of malware. - Read reviews of apps and the companies that create them - Use mobile antivirus protection - Grant apps access to only the data or phone capabilities needed to run - Turn off or delete apps that you do not use regularly - Enable the screen lock feature and use a strong password - Reset the mobile device to factory settings before trading it in

Chap 4 q. 38 ​Explain the risks and how to avoid computer virus hoaxes.

- To avoid viruses you can install antivirus programs. - A virus/malware can damage files, programs, apps, and operating systems. The malwae can also access passwords and other vital information stored on a device.

Chap 5 q. 9 How to protect against internet and network attacks:

- Use antivirus software - Be suspicious of unsolicited email attachments - Scan removable media before malware before using it - Implement firewall solutions - Back up regularly

Chap 4 q. 37 ​ List types of malware. Identify signs of a virus infection.

- Worm​: resides in active memory and replicates itself over a network to infect computers and devices, using up system resources and possibly shutting down the system. - Trojan Horse​: a destructive program disguised as a real program, such as a screensaver. When a user runs a seemingly innocent program, a trojan horses hiding inside can capture information, such as usernames and passwords, from your computer or enable someone to control your computer remotely. Unlike viruses, Trojan horses do not replicate themselves. - Rootkit:​ is a program that can easily hide and allow someone to take full control of your computer from a remote location, often for nefarious reasons. Example, it can hide in a folder that appears empty because it has instructed your computer to display it as so. They can be very dangerous and often requires special software to detect and remove. - Signs include: unusual messages or images, unusual sounds or music, available memory is less than what it should be, a program or file suddenly is missing/unknown file appears, security tools become disbaled, popups or webpages you can't close or didn't request, a program will not run, a file becomes corrupted, or the size of a file changes.

Chap 2 q. 40 _____ is the process of initiating the contact between two bluetooth devices.

- pairing

Chap 2 q. 38 Distinguish between a port replicator and a docking station.

-Port replicator is an external device that provides connections to peripheral devices through ports built into the device. Mobile users access peripheral devices by connecting the port replicator to a USB port on the computer. - Docking station is an external device that attaches to a mobile computer or device, contains a power connection and provides connections to peripheral devices. They can also include spots for memory cards, optical disc drives, and other devices.

Chap 5 q. 41 List measures users can take to contribute to green computing

-Use devices that comply with the ENERGY STAR program -don't leave computer/device running overnight -turn off monitor/printer/device when not in use -Use paperless methods to communicate -recycle paper and buy recycled paper -recycle toner and ink cartilage, computers, mobile devices, and printers

Chap 1 q. 2 Computer- User-

-an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program Hardware- ​collection of physical parts of a computer system -person who utilizes a computer or network service

Chap 5 q. 43 Describe how the following techniques are used to collect personal data: electronic profiles, cookies, phishing, clickjacking,spyware, adware and malware

Electronic Profiles: creating a profile on an online social network/register warranty/magazine subscription, the merchant that receives form usually stores the information you provide in a database Cookies: text file that contains data about you such as username, postal code, or viewing preferences. Some websites use cookies to store usernames and passwords. Phishing: message can look legitimate and request credit card numbers, social security numbers, bank account numbers, passwords or information but is a scam Clickjacking: -an object can be tapped or clicked on a website, pop-up ad or email message and contains a malicious message Spyware: -program placed on device without the user's knowledge that secretly collects information about the user Adware:-displays online advertisement in a banner, pop-up window Madware: -adware on mobile devices

Chap 4 q. 42 Identify functions of the following tools: file manager, search, image viewer, uninstaller, disk cleanup, disk defragmenter, screen saver, file compression, PC maintenance, backup and restore, and power management tools.

File Manager: displays a list of files on a storage medium -organizing files in folder -​copying, renaming, deleting, moving, and sorting files Search: attempts to locate a file, contact, calendar event, app or any other item stored on your computer or mobile device; can look through documents, photos, music Image viewer: tool that allows users to display, copy, and print the contents of a graphics file; With an image viewer, users can see images without having to open them in a paint or image editing program Uninstaller: tool that removes a program, deletes files and folders from the hard drive Disk cleanup: searches for and removes unnecessary files on computers and mobile devices, often locate duplicate files or photos, or large files Disk defragmenter:reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster Screen saver: causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time File compression: shrinks the size of a file PC maintenance: program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance Backup:allows users to copy, or back up, selected files or the contents of an entire storage medium to another storage location(hard drive, optical disc, USB flash drive) Restore: reverses the process and returns backed up files to their original form Powerful management tool: monitors a laptop or mobile devices battery usage, showing apps that consume the most battery power, displaying battery usage data since the device was last charged, and estimating usage time remaining.

Chap 2 q. 20

Most e-waste still goes into the landfill. 1.5 billion cell phones manufactured in 2018. Electronics are packed with toxic chemicals.34 months That's how short the average American keeps a cell phone.80% wasted Only 20% of our e-waste is collected globally, while most of our e-waste ends up in landfills—both at home and in the developing world—where toxic metals leach into the environment. 30% lost Even when recycled, a significant amount of electronic material cannot be recovered.

Chap 3 q. 18

The main AWS blog,Werner Vogels' blog, Charles Babcock, David Linthicum. Businesses use this to help them maximize their resources.

Chap 5 q. 4

The risks and safety measures when gaming Include malware, bothets, denial of service attacks, back doors, and spoofing. Some other risks of gaming are viruses, worms, and malware can be hidden and download the game Files, mobile apps, email message attachments, and messaging software. because the game requires a connection to the Internet, then any computer connected to the game server is subject to security cyber threats. Thieves can take control of a remote computer that does not have a high level of security protection and use it to control other computers, or they could break into the computer and install Malware to discover personal information. Other dangerous users use social media to create accounts and attempt to mislead uninformed users into revealing personal information. Some safety precautions gamers can use is checking the developer to be certain the website or person making the request is legitimate, avoid games requiring passwords to be saved to an online account on a smartphone, exercise extreme caution if the game requires to be played in administrator mode, use a firewall and make exceptions to allow only trusted individuals to access your computer, do not share your personal information with other gamers whom you meet online.

Chap 2 q. 14 Define virtualization as it relates to serves. Define the terms, server farm and mainframe.

Virtualization is the act of sharing/ pooling computing resources. Server virtualization uses software to enable a physical server which matches the hardware and computing capabilities of a server. A server farm is several servers in one location. A mainframe is a large server that handles multiple users at once.

Chap 3 q. 14 Define virtualization as it relates to serves. Define the terms, server farm and mainframe.

Virtualization is the act of sharing/ pooling computing resources. Server virtualization uses software to enable a physical server which matches the hardware and computing capabilities of a server. A server farm is several servers in one location. A mainframe is a large server that handles multiple users at once.

Chap 3 q. 12

You can purchase the appropriate desktop for your needs by considering 1. The specific software you need 2. Determine the operating system you are most comfortable with (MacOS, Windows) 3. Consider buying a more powerful desktop, because technology evolves quickly, and the least powerful desktop may not fulfil your needs later on. 4. Make sure the desktop is compatible with your Job's requirements or the task it is needed for 5. Research prices, and purchasing options 6. Look into buying a warranty


संबंधित स्टडी सेट्स

1. Introdução, Morfossintaxe e Classes Gramaticais

View Set

Chapter 36, The Origins and Spread of Christianity

View Set

CH 15- Assets: Inventory & Operations Management

View Set

BCOMM Chapter 8 Social Media for Business

View Set

CompTIA A+ (220-1002) - 1.0 Operating Systems

View Set