Create an account
a program that downloads on your computer when you install a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of your browser window or as a pop-up ad box
software that is specifically designed to detect viruses and protect a computer and files from harm
a large group of software applications (called robots or bots) that runs without user intervention on a large number of computers
a malicious program that searches for the common data files and compresses them into a file using a complex encryption KY, thereby rendering the files unusable
a software program or hardware device designed to prevent unauthorized access to computers or networks
the process by which someone uses personal information about someone else (such as the victim's name, address, and social security number to assume the victim's identity for the purpose of the defrauding others
incremental backup *partial backup)
a type of backup that only backs up files that have changed since the last time those files were backed up
a virtual communications gatway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers
the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft
any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitve information
an uinwanted piggyback program that downloads with the software you want to install from the internet and the RNS in the background of your system
a computer that is controlled by a hacker who uses it to launch attacks on other computer systems
when a hacker steals personal info with the intent of impersonating another individual to commit fraud this is known as
antivirus software works by detecting virus code unique to a particular virus known as a
a computer that a hacker has gained control of in order to launch DoS attacks is known as a ___ computer
devices that use unique personal characteristics such as fingerprints or iris patterns to identify authorized computer users are called _____ devices
programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as
a backup of only files that have changed since the last backup was executed is known as a(n)
sending emails to lure people into revealing personal information is a technique known as pharming
the individuals responsible for making a Web site easy to navigate are reffered to as
Outsourcing is thought to be an attractive option for many companies because of
the cost of savings that can be realized
which of the following statements about IT careers is true?
IT job requires frequent interactions with others
social media directors are the people who are responsible for
orchestrating the company strategy in online venues
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together