chapter 11 computer science

Created by clubamericalara 

Upgrade to
remove ads

not all breaches to computer security are planned

true

hackers often claim the intent of their security breaches is to improve security

true

many methods exist ot guarantee completely a computer or network is safe from computer viruses, worms, and trojan horses

false

cybercriminals install malicious bots unprotected computers to create zombie armies

true

a honeypot is a computer that is set up to entice an intruder to break in

true

biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is linked to a payment method such as checkin account or credit card

true

encrypted data is called plaintext

false

a digital signature is a mathematical formula that generates a code from the contents of the message

false

an online ups switches to battery power when a problem occurs in a power line

false

digital rights management is a strategy designed to prevent illegal distriubtion of computer viruses etc.

false

a cookie is a small text fiel that a wb server stores on the computer

true

green computing involves reducing the electricity while using a computer, but the practices increase enviormental waste.

false

a computer infected system is all but

available memory is more

malware is a term that can be used to describe

worms spyware back doors

zombie

computer unkowingly being controlled by another remote computer

email spoofing

used for spam and phishing scams

physical access control such as locked doors and windows usually are adequate to protect against

hardware theft

software piracy continues

because in some countries legal protection of software does not exist

windows vista include a featurecalled

bitlocker, which allows you to enrypte files

digital certificate

a notice that guarantees a usar or website site is legit

brownout

prolonged under voltage

phishing

defined as gaining inauthorized access or obtaining confedential info by taking advantage of the trusted human

forensics analysis

examination of computer media, programs, data and log files on computers, servers, networks

Carpal tunnel

inflammation of nerve connecting forearm to the palm of the wrist

cracker

someone who accesses a computer or net illegally with the intent of malicious actions

virus

potentially damaging computer program that affects infects a computer negatively

quarantine

area of the hard disk that holds an infected file until the infection is removed

botnet

a group of comprimised computers connected to a network that is being used as part of a network that attacks other networks

personal firewall

protects a personal computer and its data from unauthorized intrusions

password

private combination of characteristic into digital code

biometric device

translates a personal characeristic into digital code

surge protector

provide steady flow of electricity

spyware

key commands and startup info

adware

displays online advertisment

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set