Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CUT5 9.3

Computers: Understanding Tech 5e 9.3

TermDefinition
network sniffer A software package that displays network traffic data and can be used to spy and monitor, or to prevent unauthorized activity.
ActiveX A type of program that runs on a web page after downloading itself to the hard drive of the user. Such controls can be useful, but they pose a security risk.
phishing filter An antiphishing tool that works by comparing a site’s URL to a list of known phishing sites and alerting the user if there’s a match. This tool also scans the pages you visit for suspicious signs that a site might not be legitimate.
virus signature A tell-tale string of characters that can be used to identify a particular virus.
rotating backup A backup plan that rotates through a set of backup media. For example, a company might have seven backup sets, one for each day. On each Monday, the administrator overwrites the previous Monday backup with the new one.
incremental backup A backup that includes only the files that have changed since the last backup of any kind.
differential backup A backup that includes only the files that have changed since the last full backup.
backup appliance A special computer system that’s designed specifically for performing and storing backups.
deduplication Operations that reduce the amount of redundancy in a backup set by not backing up identical copies of certain folders and files multiple times.
disaster recovery plan A plan that explains how a company should restore its systems after a complete loss of data.
authentication The process of positively identifying a user. Forms of authentication include personal identification numbers (PINs), user IDs and passwords, smart cards, and biometrics.
strong password A password that’s hard to guess.
smart card A plastic card, similar to a credit card, that contains stored information in a computer chip inside it.
biometric identifier A physical attribute that’s unique to an individual and can be used to authenticate identity, such as a fingerprint or a retinal pattern.
fingerprint scanner A security device that authenticates users by scanning a fingerprint and comparing it to a database of fingerprints of authorized users.
hand geometry system A biometric authentication system that determines a person’s identity by measuring the dimensions of the person’s hand, which are unique to each individual.
computerized facial recognition (CFR) A biometric authentication system that recognizes a human face by comparing it with facial images in a database.
iris recognition A biometric authentication system that uses the unique patterns formed from the measurement of hundreds of details about a user’s irises.
retinal recognition system A biometric authentication system that uses as identifiers the unique patterns of blood vessels found on the backs of eyeballs.
voice verification system A biometric authentication system that recognizes individuals by measuring the pitch and timbre of their voices.
signature verification system An authentication system that works by comparing a scanned-in handwritten signature against signatures in a database to determine if it is a forgery or authentic.
encryption A data security method that involves scrambling information so the data is unreadable until it is decrypted (unscrambled).
ciphertext Encrypted text.
encryption key An algorithm that dictates how data will be encrypted and is used to break the encryption code and read the information. An encryption key is generated automatically and shared between two computers that wish to communicate.
secret key encryption Encryption in which both parties use the same encryption key to encrypt and decrypt the data. Also called private key encryption.
public key encryption An encryption method that uses two encryption keys: a public encryption key, which all authorized users know, and a secret encryption key, which only the sender and the receiver know.
RSA Named for its developers: Rivest, Shamir, and Adleman. A popular public encryption technology used to transmit data over the Internet.
Secure Sockets Layer (SSL) A cryptographic protocol that provides secure communications on the Internet for transmitting data such as that used in credit card activities, emails, faxes, and banking transactions.
Transport Layer Security (TLS) The successor to SSL, originally released as an upgrade to SSL.
Hypertext Transfer Protocol Secure (HTTPS) A secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection.
Secure HTTP (S-HTTP) A protocol for transmitting data securely over the World Wide Web, designed to transmit individual messages securely.
auditing A review of monitoring data and system logins to look for unauthorized access and suspicious behavior.
Created by: softcrylic
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards