chapter 8 computer science

Ace your homework & exams now with Quizwiz!

firewall

software or hardware that creates a blockade between a computer system or network and the internet

electronic wallet

software that stores and securely processes the financial information you enter when you finalize an online purchase

viruses

software that travels through networks to harm computer programs.

wi-fi piggybacking

tapping into an unprotected Wi-Fi network

internet addiction

the excessive use of the internet for gaming, video, web surfing, texting, blogging, social networking, or shopping

cyberterrorism

the premeditated use of malware such as viruses and worms to disrupt computers and networks, causing data loss, theft, or harm

phishing

a scam that uses email or social media try to trick a user into revealing personal information on the pretense of being the users bank or other legitimate institution

encryption

a security method that scrambles or codes data as it is transmitted over a network or that makes digital content unreadable unless viewed with a valid encryption key or authorized hardware device

worm

a self-replicating program that consumed system resources

magnetic hard drives

a storage device made up of one or more disks (or platters) that spin on a spindle, and read/write heads that move over the surface of the disks to save and retrieve data. the disks use magnetized particles to store data as bits

solid state hard drives

a storage device that has no moving parts and is relatively stable; used in portable computers

antivirus

a program that finds and removes viruses, trojan horses, worms, and bots from a computer and scans incoming and outgoing email messages to identify threats

antispyware

a program that prevents spyware from installing itself on a computer and removes any existing spyware

war driving

a practice in which someone searches for an maps unsecured wi-fi networks from a vehicle, gains access to your system, and then can pose as another person online to download illegal content in his or her name

hackers

a person that uses computers and networks without authorization to access valuable data and services without being detected

identity thief

a person who obtains personal information from online and real world sources to gain enough information to impersonate you for financial gain without your knowledge

cyberterrorists

a person who uses automated malware such as viruses and worms to disrupt computers and networks, causing data loss, theft, or harm

service packs

a collection of files that software publishers issue as a major update to software repair problems, enhance features, and improve performance and security of a program

wireless router

a device that allows computer to connect wirelessly to a local network or to the internet; might be plugged into a wall outlet for power

uninterruptible power supply

a device that provides battery backup for a short period in the event of a power failure

hoax

a fake coupon, threat, or story sent in an email or social media post that warns about a nonexistent virus or event to prompt you to clink a link that can be used to install malware

hacktivists

a hacker that accesses computers without authorization for the purpose of intention of a social goal or impact for a political cause

black hat

a member of the destructive hacker community

white hat

a member of the nondestructive hacker community

pharming

a web site scam to obtain personal information in which a server is hacked and used to reroute traffic from what looks like a legitimate web site to a fake web site

carpal tunnel syndrome

an RSI that affects the wrist, hand, and arm, and is aggravated by prolonged keyboarding or gesturing on tablets

hotspots

an area in a wireless network where you can access the internet

Blue Screen of Death

common term for the screen displayed when a hard drive fails on a computer running the windows operating system

cybercrime

an illegal act of committed using a computer on a network or over the internet

repetitive strain injuries (RSIs)

an injury caused by performing the same movement repeatedly, such as by using of computers, tablets, smartphones, and other electronic devices

incognito/inprivate mode

browser setting that allows you to avoid being tracked through your browser when visiting web sites and shopping online

computer vision syndrome

eyestrain, headaches, dry eyes, blurry vision, or even double vision as a result of prolonged digital viewing on screens

netiquette

internet etiquette; the rules for appropriate online behavior

spam

junk email messages

malware

malicious software, including viruses and spyware, that installs itself without permission and damage data and programs

cloud storage systems

online storage system used for backups; provides additional data protection

online identity

personal photos, videos, purchases, public posts, comments, and information forwarded through web sites and social networking

online profile

personal photos, videos, purchases, public posts, comments, and information forwarded through web sites and social networking

cyberattack

physical damage and a general disruption of regular activities caused by a hacker or cyberterrorist on a computer network

ergonomics

the study of safe and efficient working environments

biometrics

the use of personal features to identify a person; includes fingerprint scanners, facial recognition technology, and retinal scans

cyberbullying

to use web technologies to harass or intimidate people online annoying or unwelcome messages

cyberstalking

to use web technologies to monitor or track the activities of whereabout of someone online


Related study sets

Photosynthesis & Cellular Respiration

View Set

Anatomy 5 - Femur, Patella, Tibia, Fibula & Foot

View Set

Honors Chemistry Chapter 11 Assessment

View Set

Advanced MS - Chapter 36 & 37 WB

View Set