Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IDT

Vocab for my IDT class.

TermDefinition
Computer security risk Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer crime * Any illegal act involving a computer.
Cybercrime * Online or Internet-based illegal acts.
Hacker* Someone who accesses a computer or network illegally.
Cyber extortionist* Someone who uses e-mail as a vehicle for extortion.
Cyberterrorist* Someone who uses the Internet or network to destroy or damage computers for political reasons.
Virus* Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission.
Worm* Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system.
Trojan horse* Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program.
Malware Short for malicious software; programs that act without a user’s knowledge and deliberately alter a computer’s operations.
Antivirus program Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Bot Program that performs a repetitive task on a network.
Botnet* Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Firewalls* Hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.
Intrusion detection software Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.
Honeypot* Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network.
CAPTCHA* Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Websites to provide further protection for a user’s password by verifying that user input is not computer generated.
Personal identification number Numeric password, either assigned by a company or selected by a user.
Digital forensics* The discovery, collection, and analysis of evidence found on computers and networks.
License agreement An agreement issued by a software manufacturer that gives the user the right to use the software.
Information theft Computer security risk that occurs when someone steals personal or confidential information.
Encryption* The process of encoding data and information to an unreadable form.
Decrypt* Process of deciphering encrypted data into a readable form.
Digital certificate* A notice that guarantees a user or a Website is legitimate.
Noise* Electrical disturbance that can degrade communications.
Power surge Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts.
Surge protector Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment.
Backup Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.
Ergonomics* The science of incorporating comfort, efficiency, and safety into the design of the workplace.
Computer ethics* Moral guidelines that govern the use of computers and information systems.
Morals A person’s standards or beliefs pertaining to their subconscious.
Intellectual property rights* Rights to which creators are entitled for their work.
Copyrights* Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Code of conduct Written guide-lines that help determine whether a specific computer action is ethical or unethical.
Spam Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Employee monitoring The use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
Created by: amanning
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards