Flashcards based on the text "Discovering Computers & Microsoft Office 2010" by Shelly and Vermaat. This set includes all the words from the glossary of chapter 5.
Terms in this set (50)
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
To make a copy of a file.
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Device that authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
code of conduct
Written guidelines that determine if an action is ethical or allowed
Any illegal act involving a computer.
Moral guidelines that govern the use of computers and information systems.
Process of restricting access to certain material on the Web.
Small text file that a Web server stores on a computer.
Someone who accesses a computer or network illegally with the intent of destroying data
Online or Internet-based illegal acts.
Someone who uses e-mail as a vehicle for extortion.
Someone who uses the Internet or network to destroy or damage computers for political reasons.
Process of deciphering encrypted data into a readable form.
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. See also DoS attack.
A notice that guarantees a user or a Web site is legitimate.
The discovery, collection, and analysis of evidence found on computers and networks. See also computer forensics, cyberforensics, or network forensics.
digital security risk
Any event or action that could cause a loss or damage to computer hardware
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
Process of converting readable data into unreadable characters to prevent unauthorized access.
Biometric device that captures curves and indetations of a fingerprint
Hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.
Computer usage that reduces the electricity and environmental waste involved in using a computer.
Someone who accesses a computer or network illegally.
Right of individuals and companies to deny or restrict the collection and use of information about them.
Computer security risk that occurs when someone steals personal or confidential information.
An agreement issued by a software manufacturer that gives the user the right to use the software.
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
online security service
A wed app that evaluates our computer or mobile device to check for internet and email vulnerabilities
Private combination of characters associated with a user name that allows access to certain computer resources.
Utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
personal identification number (PIN)
Numeric password, either assigned by a company or selected by a user.
Unauthorized and illegal duplication of copyrighted material.
Process that attempts to prevent software piracy by requiring users to provide a software product's 25-character identification number in order to receive an installation identification number.
To copy backed up files by copying them to their original location on the computer.
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge.
Web site that uses encryption techniques to secure its data.
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
The unauthorized and illegal duplication of copyrighted software
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Program placed on a computer without the user's knowledge that secretly collects information about the user.
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. See also surge suppressor.
Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
Program that restricts access to certain material on the Web.
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Discovering Computers Chapter 5
Discovering Computers Chapter 5
COM S 103 Chapter 11
OTHER SETS BY THIS CREATOR
Chapter 9 Terms
Driver's Training Book Test
Chapter 7 Vocab