CAC CIS 120 Chapters 1,3,9,13

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Client computer

A computer connected to the Internet that asks for data

Key pair

In public-key encryption, the two keys—one for coding and one for decoding

Top-level domain

In the URL http://www.microsoft.com/surface, the portion labeled ".com"

Protocol

In the URL http://www.microsoft.com/surface, the portion labeled "http"

Quarantining

Regarding computer protection; placing a found virus in a secure area on the hard drive

Strong Passwords

Rules for creating passwords include all of the following: keep your password a secret, change your password frequently, use letters, numbers, and symbols in your passwords, but does NOT include: keep a master password that is the same for all of your accounts

Web browser

Software that enables you to display and interact with text and other media on the web

Secure socket layer

The "s" in "https" stands for "secure".

Digital divide

The gap in ease of access to the Internet and technology

Internet backbone

The main path of the Internet along which data travels the fastest

Screen resolution

The number of pixels displayed on the screen

Computer literate

The term is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.

URL (Universal Resource Locator)

The unique address for a particular website

Crowdfunding

Using the Internet to get small donations from many people to start a business

DNS (Domain Name Server)

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a DNS.

Pharming

When malicious code is planted on your computer and alters your browser's ability to find web addresses

Zombie

a computer controlled by a hacker

The Internet

a large network of networks

Breadcrumb trail

a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website.

Spyware

a program that gathers information about your surfing habits without your knowledge.

Applet

a small program that resides on a server and is designed to be downloaded and run on a client computer.

Dynamic address

a temporary IP address that is assigned from an available pool of IP addresses.

IP address

a unique number that identifies a computer, server, or device connected to the Internet

Macro virus

a virus that is attached to documents such as Word or Excel files.

Wiki

allows users to add, remove, or edit its content.

Social engineering

any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

Worm

attempts to travel between systems through network connections to spread an infection

Catfishing

creating fake profiles on a dating site and developing a fabricated online and phone relationship

Cybercrime

formally defined as any criminal action perpetrated primarily through the use of a computer

ICANN

is responsible for the Internet's domain name system and the allocation of IP addresses.

Virus signature

is the portion of virus code that is unique to a particular computer virus.

Collaborative consumption

joining together as a group to use a specific product more efficiently.

Scareware

malware on your computer used to convince you that your computer has a virus

Packet filtering

method for selectively allowing certain requests to access ports

Rootkit

programs that allow hackers to gain access to your computer without your knowledge

Virtual reality

replaces perceived reality with a different world.

Spear fishing

sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data.

HTTP (Hyper Text Transfer Protocol)

was created for the transfer of hypertext documents across the Internet

Firewall

Blocks logical ports from invaders and make your computer invisible to others on the Internet. Hardware or software for protecting computers from hackers.

Kilobyte

Compared to Megabyte, Gigabyte, and Petabyte; Kilybyte is the smallest unit of measure

E-commerce business

All of the following are types of e-commerce business B2C, B2B, and C2C. C2B is NOT a type of e-commerce business.

Computer forensics

Analyzing computer systems to gather potential legal evidence


Set pelajaran terkait

Spanish Test -- Conditional/Future Perfect, Si Clauses

View Set

EMT - Chapter 11 - Baseline Vital Signs, Monitoring Devices and History Taking

View Set

Gen Psych 1101: Practice test Chapters 5 & 6. +

View Set