How can we help?

You can also find more resources in our Help Center.

68 terms

CPT 101 Final

Spring '08 semester, CPT 101
Computer Security Risk
any event or action that could cause loss of or damage to hardware, software, data, information, or processing capabilities
a potentially damaging comp program that affects, or infects, computers negatively by altering the way the computer works w/out the users knowledge or permission
a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan Horse
program that hides w/in or looks like a legitimate program. A certain action or condition usually triggers the viral program.
compromised computer, one whose owner is unaware the computer is being controlled remotely by an outsider
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
a vulnerable computer that is set up to entice an intruder to break into it
Possessed Object
any item that you must carry to gain access to a computer or computer facility
Examples of Biometric
finger print scanners, hand geometry systems, signature verification systems, iris recognition systems, and retinal scanners
Finger print scanners
most commonly used biometric
Single-user license agreement; end-user license agreement (EULA)
most commonly type of license included w/ software purchased by individual users
EULA users are permitted to:
Install software on 1 computer, make 1 copy as back up, give or sell the software to one other individual only after the software is removed from users computer first
a process of converting readable data into unreadable characters to prevent unauthorized access
any unwanted signal that is mixed w/ the normal voltage entering the computer
when electrical supply drops
a prolonged under-voltage
over-voltage or power surge
occurs when the incoming electrical power increases significantly above the normal 120 volts
Uninterruptible Power Supply (UPS)
device that contains surge protections circuits and one or more batteries that can provide power during a temporary or permanent loss of power
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
a small text file that a Web server stores n your computer
Websites use cookies to
track users preferences, store users' passwords, keep track of items, track how regularly users visit a site, target advertisments
a program placed on a computer w/out the users knowledge that secretly collects information about the user
a scam in which a perpetrator sends an official e-mail message that attempts to obtain your personal and financial information
a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
Computer Forensics/digital/network/cyber forensics
the discovery, collection, and analysis of evidence found on computer networks
an applied science devoted to incorporating comfort, efficiency, and safety into the design if items in the workplace
Symptoms of a user w/ computer addiction include the following:
Cravings, Overjoyed when at computer, unable to stop activity, irritable when not at computer, neglects family and friends, problems at work and school
Information Systems (IS)
a collection of hardware, software, data, people, and procedure that work together to produce quality information
Most system development cycles contain five phases:
Planning, analysis, design, implementation, operation/support/security
System analyst
responsible for designing and developing an information system; they are also the users primary contact
Gantt Chart
an effective way to show the time relationships of a projects activities
Machine language
known as the first generation of programming languages, is the only language the computer directly recognizes
Enterprise refers to
large multinational corporations, universities, hospitals, research laboratories, and government organizations,
Computer Aided Design (CAD)
uses a computer and special software to aid in engineering, drafting, and design
Computer Aided Manufacturing (CAM)
the use of computers to control production equipment
Enterprise Resources Planning (ERP)
provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise, including manufacturing and distribution, accounting, finance, sales, product planning, and human resources
Advantages of ERP include:
complete integration of information systems across departments, better project management, and better customer service
Full Backup
provides the best protection against data loss b/c it copies all program and data files
Differential Backup
copies only the files that have changed since last full backup
Incremental Backup
copies only the files that have changed since the last full backup or last incremental backup
Selective Backup
sometimes called a partial backup, allows the user to choose specific files to backup
Disaster Recovery Plan
written plan describing steps a company would take to restore computer operations in the event of a disaster
A Disaster Recovery Plan contains 4 major components:
The emergency plan, the backup plan, the recovery plan, and the test plan
Emergency Plan
specifies steps t be taken immediately after a disaster strikes
Backup Plan
specifies how a company uses backup files and equipment to resume information processing
Recovery Plan
specifies the actions to be taken to restore full info processing operations
Test Plan
contains info for simulating various levels of disaster and recording an organizational ability to recover
Information Technology Association of America (ITAA)
estimates tat the current IT workforce is more than 10.5 million w/ an expected increase of 2- 3 % per year
Computer Information System (CIS)
after 2 yr. study in a CS curriculum students may receive an assoc. degree or certificate
Entry level jobs for students with a 2 yr. CIS degree include:
application programer/developer, computer operator, computer sales rep, computer tech, graphic designer, help desk specialist, and technical writer
the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area
Benefits of Certification:
Career, Professional, Salary
Document Window
portion of a document through which you view on the screen
Print Layout View
also the default (preset) view, shows the document on a mock sheet of paper in the document window
Insertion Point
blinking vertical bar that indicates where text, graphics, and other items will be inserted
Office Button
a central location for managing and sharing documents
contains a list of commands
a list of additional commands associated with the selected command
The MLA styles uses
in-text Parenthetical Citations
Hard copy or Printout
printed version of the worksheet
Best Fit
means that the width of the column will be increased or decreased so the widest entry will fit in the column
a dot on the screen that contains a color
Drag and Drop
Using the mouse to move or copy cells
A power point presentation is called a
slide show
the mode in which the presentation appears on the screen
The default view for PPT is
Slide Pane
which shows a large view of the current slide on the right side of the window
Notes Pane
at the bottom of the window, is an area where you can type notes and addt'l info