Study sets, textbooks, questions
Upgrade to remove ads
Computer Literacy Final
Terms in this set (41)
Application Software Examples
Programs that direct the computer to carry out specific tasks, for example, word processing, playing a game, or computing numbers on a worksheet.
The speed or data transfer rate of a network.
An array of bits that specify the color of each pixel in a rectangular array of pixels.
Images composed of tiny squares or dots that correspond to one pixel.
A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks.
Copying Other People's Work Online
Trusting collective opinion of a crowd of people - referred to as the window of the crowd - rather than that of an expert.
Dangers of Mobile Apps
1. Weak Server Side Controls
2. Lack of Binary Protection
3. Insecure Data Storage
4. Insufficient Transport Layer Protection
5. Unintended Data Leakage
6. Poor Authorization and Authentication
7. Broken Cryptography
8. Client Side Injection
9. Security Decisions via Untrusted Inputs
10. Improper Session Handling
All the information that someone could find out about you by searching the web, including social network sites.
Rearranging the fragmented files on a disk.
Distributed Denial of Service Attacks
An attack that is perpetrated by sending out so much traffic that it cripples a server or network.
Drive Imaging Software
Software that hosts the process of creating a mirror image of an entire hard disk.
Conducting business on the web.
A window that displays the contents of a current location and contains helpful parts so that you can navigate within the file organizing structure of Windows.
Discussion boards or message boards.
Hardware vs. Software
Hardware- The physical components of a computer.
Software- A set of instructions that tells the hardware how to perform a certain task.
High Definition Cables
HDMI - High Definition Multimedia Interface
A private network that runs on web technologies.
A set of four numbers, separated by periods, which uniquely identifies devices on a network.
Unwanted or unsolicited email, typically in the form of advertising or promotional material.
An attack on malware that occurs when certain conditions are met.
Pages Edited by User Anonymously
IP Editing or Unregistered Editing
A software update that addresses individual problems as they are discovered.
Using an open wireless network to access the internet without permission.
The software or content should run/display properly on any type of computer, cell phone or other device.
A set of programs that enables someone to gain control over a computer system while hiding the fact that the computer has been compromised.
A special diagnostic mode for troubleshooting the system that loads Windows without most device drivers.
Search Engine Spiders
A program sent out by a search engine to crawl the web and gather information.
Searches Using AND, OR, NOT
Boolean searches- use logical operators to link the words you are looking for.
Searching Other Search Engines
Metasearch Engines- aggregate results from multiple search engines.
Social Media Websites
Websites that enable you to create user-generated content, connect, network, and share.
Top Level Domain Names
The suffix that follows the domain name in a URL that indicates the type of website you are visiting.
Trojan Horse Virus
A program that appears to be a legitimate program, but that is actually malicious.
Uniform Resource Locators
The address of a website.
Graphics that are math based.
Videos Gaining Sudden Popularity
Social Media Sharing, Tagging, Streaming Media (Youtube)
Favorites or Internet shortcuts.
A small text file placed on your computer when you visit a website that is used to identify you when you return to the site.
What is a database?
An organized collection of facts about people, events, things, or ideas related to a specific topic or purpose.
What is data analytics?
A form of self-replicating malware that does not need a host to travel; worms travel over networks and spread over the network connections without any human intervention.
Sets with similar terms
CIS Chapter 10
MIS Chapter 10
OFM 101 - Pt. 1 Ch 7 - Computer Security…
Other sets by this creator
Managerial Accounting: Chapter 13
Intro to Business, Chapter 17
Intro to Business, Chapter 16
Intro to Business, Chapter 15
Which of the following is not an example of a reference group? a. Rock-star subculture b. United States Military Academy c. Terrorists d. Mass media
Many textbooks written prior to the 1980s presented men is challenging and aggressive activities but portrayed women as homemaker, mothers, nurses, and secretaries just as many early textbooks did not provide a balanced view of different races and ethnicities. What do you think is the impact of the Digital Age on such unbalanced portrayals in educational content?
What did Harlow's research on rhesus monkeys reveal?
Using your school or local library and the Internet, research information on the clergy during the middle ages. Based on your research and the material you read, how would you classify their religious organization? Some of the characteristics of the clergy might be regarded as a cult. Explain why the clergy in the middle ages were not a cult. Using proper grammar, sentence structure, spelling, and punctuation, write a paragraph defending your conclusion.
Other Quizlet sets
Micro diseases (ch. 23 & 24)