Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ODW 8.2

Our Digital World 8.2

TermDefinition
encryption The process of using a key to convert readable information into unreadable information to prevent unauthorized access or usage.
public key A code key used in encryption. Creates an encrypted message that is decrypted by a private key.
private key A code key used in encryption that is known to only one or both parties when exchanging secure communications.
public key encryption A system of encrypting and decrypting data using a public key and private key combination.
Wi-Fi Protected Access (WPA) An encryption standard used to protect data sent across a wireless network. Designed by the Wi-Fi Alliance to overcome the security limitations of Wired Equivalent Privacy (WEP).
Wired Equivalent Privacy (WEP) An encryption standard used to protect data sent across a wireless network. An older and less secure technology than Wi-Fi Protected Access (WPA).
Wi-Fi Protected Access 2 (WPA2) A stronger, more complex encryption standard than WPA. WPA2 became mandatory in 2006 for all new equipment certified by the Wi-Fi Alliance.
malware Collectively, damaging computer programs such as viruses and spyware, which can do anything from displaying pop-up window advertisements to destroying your data or tracking your online activities.
spam Mass emails sent to those who haven’t requested them, usually for the purpose of advertising or fraud.
virus A type of computer program that is placed on your computer without your knowledge. The key characteristic of a virus is that it can reproduce itself and spread from computer to computer by attaching itself to another, seemingly innocent, file.
worm A self-replicating computer program with the ability to send out copies of itself to every computer on a network. Worms are usually designed to damage the network, in many cases by simply clogging up the network’s bandwidth and slowing its performance.
Trojan horse Malware that masquerades as a useful program. When you run the seemingly useful program, you let this type of malware into your system. It opens a “back door” through which hackers can access your computer.
macro virus A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets.
logic bomb virus A piece of code that is placed in a software system to set off a series of potentially damaging events if certain conditions are met.
rootkit A set of programs or utilities designed to allow a hacker to control a victim computer’s hardware and software and permit a hacker to monitor the user’s actions.
botnet A group of computers that have been compromised (zombies or bots) so they can forward communications to a controlling computer.
zombie A computer compromised by malware that becomes part of a botnet and is used to damage or compromise other computers. Also called a bot.
spyware Software that tracks activities of a computer user without the user’s knowledge.
adware Software that is supported by advertising and is capable of downloading and installing spyware.
scareware A scam where an online warning or popup convinces a user that his or her computer or mobile device is infected with malware or has another problem that can be fixed by purchasing and downloading software, which may do nothing or install malware.
ransomware A scam where a user’s computer is locked or data encrypted with a message from the malware creator demanding payment to restore access or data.
Transport Layer Security (TLS) A protocol that protects data, such as credit card numbers as they are being transmitted between a customer and online vendor or payment company.
Secure Socket Layer (SSL) A cryptographic protocol that is required for creating Transport Layer Security (TLS).
cookie A small file stored on your computer by a web server to track information about you and your activities.
phishing The practice of sending email that appears to be from a legitimate organization in an attempt to convince the reader to reveal personal information.
spear-phishing A targeted phishing attack sent to individuals employed by certain companies for the purpose of obtaining trade secrets or other confidential information, leading to financial gain for the hacker.
Created by: softcrylic
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards