click below
click below
Normal Size Small Size show me how
Study for computers
yeee
| Question | Answer |
|---|---|
| RAM | Temporary memory used by a computer to store data and programs while they are being used |
| Phishing | Fraudulent attempts to obtain personal information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in an electronic communication |
| Malware | Malicious software, such as viruses or worms, designed to harm systems |
| World Wide Web | A system of interconnected pages of information accessible via the internet |
| HTTP | The protocol used for transmitting data on the World Wide Web, often with ‘S’ for encrypted communication |
| Domain Name | The human-readable name for a website’s address, like EXAMPLE.COM |
| Bandwidth | The max rate at which data can be transferred over an internet connection. |
| Firewall | Software or hardware that protects a computer or network from unauthorized access |
| Cyberbullying | The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature |