Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

Spring '08 semester, CPT 101

Computer Security Risk

any event or action that could cause loss of or damage to hardware, software, data, information, or processing capabilities


a potentially damaging comp program that affects, or infects, computers negatively by altering the way the computer works w/out the users knowledge or permission


a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network

Trojan Horse

program that hides w/in or looks like a legitimate program. A certain action or condition usually triggers the viral program.


compromised computer, one whose owner is unaware the computer is being controlled remotely by an outsider


a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network


a vulnerable computer that is set up to entice an intruder to break into it

Possessed Object

any item that you must carry to gain access to a computer or computer facility

Examples of Biometric

finger print scanners, hand geometry systems, signature verification systems, iris recognition systems, and retinal scanners

Finger print scanners

most commonly used biometric

Single-user license agreement; end-user license agreement (EULA)

most commonly type of license included w/ software purchased by individual users

EULA users are permitted to:

Install software on 1 computer, make 1 copy as back up, give or sell the software to one other individual only after the software is removed from users computer first


a process of converting readable data into unreadable characters to prevent unauthorized access


any unwanted signal that is mixed w/ the normal voltage entering the computer


when electrical supply drops


a prolonged under-voltage

over-voltage or power surge

occurs when the incoming electrical power increases significantly above the normal 120 volts

Uninterruptible Power Supply (UPS)

device that contains surge protections circuits and one or more batteries that can provide power during a temporary or permanent loss of power


gives authors and artists exclusive rights to duplicate, publish, and sell their materials


a small text file that a Web server stores n your computer

Websites use cookies to

track users preferences, store users' passwords, keep track of items, track how regularly users visit a site, target advertisments


a program placed on a computer w/out the users knowledge that secretly collects information about the user


a scam in which a perpetrator sends an official e-mail message that attempts to obtain your personal and financial information


a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing

Computer Forensics/digital/network/cyber forensics

the discovery, collection, and analysis of evidence found on computer networks


an applied science devoted to incorporating comfort, efficiency, and safety into the design if items in the workplace

Symptoms of a user w/ computer addiction include the following:

Cravings, Overjoyed when at computer, unable to stop activity, irritable when not at computer, neglects family and friends, problems at work and school

Information Systems (IS)

a collection of hardware, software, data, people, and procedure that work together to produce quality information

Most system development cycles contain five phases:

Planning, analysis, design, implementation, operation/support/security

System analyst

responsible for designing and developing an information system; they are also the users primary contact

Gantt Chart

an effective way to show the time relationships of a projects activities

Machine language

known as the first generation of programming languages, is the only language the computer directly recognizes

Enterprise refers to

large multinational corporations, universities, hospitals, research laboratories, and government organizations,

Computer Aided Design (CAD)

uses a computer and special software to aid in engineering, drafting, and design

Computer Aided Manufacturing (CAM)

the use of computers to control production equipment

Enterprise Resources Planning (ERP)

provides centralized, integrated software to help manage and coordinate the ongoing activities of the enterprise, including manufacturing and distribution, accounting, finance, sales, product planning, and human resources

Advantages of ERP include:

complete integration of information systems across departments, better project management, and better customer service

Full Backup

provides the best protection against data loss b/c it copies all program and data files

Differential Backup

copies only the files that have changed since last full backup

Incremental Backup

copies only the files that have changed since the last full backup or last incremental backup

Selective Backup

sometimes called a partial backup, allows the user to choose specific files to backup

Disaster Recovery Plan

written plan describing steps a company would take to restore computer operations in the event of a disaster

A Disaster Recovery Plan contains 4 major components:

The emergency plan, the backup plan, the recovery plan, and the test plan

Emergency Plan

specifies steps t be taken immediately after a disaster strikes

Backup Plan

specifies how a company uses backup files and equipment to resume information processing

Recovery Plan

specifies the actions to be taken to restore full info processing operations

Test Plan

contains info for simulating various levels of disaster and recording an organizational ability to recover

Information Technology Association of America (ITAA)

estimates tat the current IT workforce is more than 10.5 million w/ an expected increase of 2- 3 % per year

Computer Information System (CIS)

after 2 yr. study in a CS curriculum students may receive an assoc. degree or certificate

Entry level jobs for students with a 2 yr. CIS degree include:

application programer/developer, computer operator, computer sales rep, computer tech, graphic designer, help desk specialist, and technical writer


the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area

Benefits of Certification:

Career, Professional, Salary

Document Window

portion of a document through which you view on the screen

Print Layout View

also the default (preset) view, shows the document on a mock sheet of paper in the document window

Insertion Point

blinking vertical bar that indicates where text, graphics, and other items will be inserted

Office Button

a central location for managing and sharing documents


contains a list of commands


a list of additional commands associated with the selected command

The MLA styles uses

in-text Parenthetical Citations

Hard copy or Printout

printed version of the worksheet

Best Fit

means that the width of the column will be increased or decreased so the widest entry will fit in the column


a dot on the screen that contains a color

Drag and Drop

Using the mouse to move or copy cells

A power point presentation is called a

slide show


the mode in which the presentation appears on the screen

The default view for PPT is


Slide Pane

which shows a large view of the current slide on the right side of the window

Notes Pane

at the bottom of the window, is an area where you can type notes and addt'l info

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording