Ch. 8-10 Computer Concepts

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

IP address

the means by which all computers connected to the internet identify each other.

Unshielded twisted-pair cable

the most popular transmission media option for wire Ethernet networks.

Resolution

the number of data points it records for each image captured.

Sampling rate

the number of times per second a signal is measured and converted to a digital value.

Quarantining

the placement of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.

Phishing

the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.

Syncing

the process of updating your data so that the files on your cell-Smartphone and computer are the same.

P2P sharing

the process of users transferring files between computers.

MMS

allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.

Data plan

an Internet connectivity plan or text messaging plan.

Denial-of-service attack

an attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate user access.

Distributed denial-of-service attack

an automated attack that is launched from more than one zombie computer at the same time.

Hoax

an e-mail message or Web site that contains information that is untrue, and is published with the purpose of deceiving others.

Spyware

an unwanted piggyback program that downloads with the software you want to install from the Internet then runs in the background of your system.

Internet tablet

another type of very light, very portable device.

eReaders

devices that can display etext and have supporting tools, like note taking, bookmarks, and integrated dictionaries.

Cell phone

has evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device.

Digital signal processor

included in cell phones to handle the compression work.

Codec

is a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space.

SMS

is a technology that allows you to send short text messages over mobile networks.

Multipartite virus

literally meaning "multipart" virus; a type of computer virus that attempts to infect both the boot sector and executable files at the same time.

Tethering

makes sure that as long as you have a 3G signal, your computer can access the Internet even when it tells you there are no available wireless networks.

Pharming

planting malicious code on a computer that alters the browser's ability to find Web addresses and directs users to a bogus Web site.

Rootkits

programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.

Smartphone

require a data plan from the cell phone provider and extends the power of a cell phone.

Netbooks

run a fully featured operating system but weigh in at 2 pounds or less.

Portable media players

small portable devices (such as iPods) that enable you to carry your digital audio files around with you.

Microbrowser

software provides a Web browser that is optimized to display Web content effectively on the smaller screen.

Malware

software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering.

Antivirus software

software that is specifically designed to detect viruses and protect a computer and files from harm.

Pretexting

the act of creating an invented scenario to convince someone to divulge information.

Script

a list of commands that can be executed on a computer without user interaction.

Urban legend

a hoax that becomes so well known that it is accepted by society as true even though it is false.

Base transceiver station

a large communications tower with antennas, amplifiers, receivers, and transmitters.

Botnet

a large group of software applications that runs without user intervention on a large number of computers.

Backups

a backup is a copy of computer files that you can use to replace the originals if they are lost or damaged.

Packet sniffer

a computer hardware device or software program designed to detect and record digital information being transmitted over a network.

Trojan horse

a computer program that appears to be something useful or desirable, but at the same time does something malicious in the background without the user's knowledge.

Logic bomb

a computer virus that runs when a certain set of conditions is met, such as when specific dates are reached on the computer's internal clock.

Logical port blocking

a condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through the computer.

Image backup

a copy of an entire computer system, created for restoration purposes.

Gray-hat hackers

a cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

Uninterruptible power supply

a device designed to power a computer from large batteries for a brief period during a loss of electrical power.

Wireless range extender

a device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity.

Surge protector

a device that protects computers and other electronic devices from power surges.

Biometric authentication device

a device that uses some unique characteristic of human biology to identify authorized users.

Packet filtering

a feature found in firewalls that filters out unwanted data packets sent to specific logical ports.

Data file

a file that contains stored data.

Program file

a file that is used in the running of software programs and does not store data.

Personal firewall

a firewall specifically designed for home networks.

VoIP

a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.

White-hat hacker

a hacker who breaks into systems just for the challenge of it.

Black-hat hacker

a hacker who uses his knowledge to destroy information or for illegal gain.

encryption viruses

a malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.

Internet service provider

a necessity if you want to connect your Smartphone to the Internet.

GPS

a network of 21 satellites that constantly orbits the Earth.

Network address translation

a process that firewalls use to assign internal Internet Protocol (IP) addresses on a network.

Inoculation

a process used by antivirus software; compares old and current qualities of files to detect viral activity.

Worm

a program that attempts to travel between systems through network connections to spread infections.

Adware

a program that downloads on your computer when you install a freeware program, game, or utility.

Backdoor programs

a program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission.

Master boot record

a small program that runs whenever a computer boots up.

Packet

a small segment of data that is bundled for sending over transmission media.

Wireless markup language

a specially designed content designed for wireless devices, which is text-based and contains no graphics.

Digital rights management

a system of access control that allows only limited use of material that has been legally purchased.

Incremental backup

a type of backup that only backs up files that have changed since the last time files were backed up.

Scareware

a type of malware that is downloaded onto your computer and tries to convince you that your computer is infected with a virus or other type of malware.

Flash memory

a type of nonvolatile memory to store files.

Keystroke logger

a type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

polymorphic virus

a virus that changes its virus signature every time it infects a new file.

Macro virus

a virus that is distributed by hiding it inside a macro.

Time bomb

a virus that is triggered by the passage of time or on a certain date.

Stealth virus

a virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.

e-mail virus

a virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.

Cybercrime

any criminal action perpetrated primarily through the use of a computer.

Piggybacking

connecting to a wireless network (other than your own) without the permission of the owner.

Analog-to-digital converter chip

converts your voice's sound waves into digital signals.

Digital convergence

the use of a single unifying device to handle media.

Telephony

the use of equipment to provide voice communications over a distance.

Drive-by download

the use of malicious software to attack your computer by downloading harmful programs onto your computer, without your knowledge, while you are surfing a Web site.

Spam

unwanted or junk e-mail.

Bluetooth

uses radio waves to transmit data signals over short distances.


Set pelajaran terkait

Chapter 15 Assignment for Module 11

View Set

Chapter 10: Fluid and Electrolytes, NCLEX-Style Chapter Review Questions

View Set

human anatomy chapter 5 questions

View Set

U.S. Government Part II.B - Formal Constitutional Amendment Process

View Set