Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IT-ERA_FINALS_PART 2

QuestionAnswer
Tools that enable the transmission of information, including telephones, radio, television, and the internet. Communication Technology
Types of Communication Technology Telephone Radio Television Internet
When you visit Google, YouTube, or Facebook, you’re using the World Wide Web. World Wide Web (WWW)
A single document or screen you see on a website. Web Page
Powerful computers that store websites, apps, or data and send them to your device when you request it. Servers
The companies that give you ACCESS TO THE INTERNET Internet Service Providers (ISP)
The WEB ADDRESS you type to visit a website. Uniform Resource Locator (URL)
Like a PHONEBOOK of the Internet Domain Name Servers (DNS)
SPECIAL CABLES that use light to carry Internet data super fast under the ground or even under the ocean. Fiber Optic Cables
A building full of servers that store and manage Internet data. Data Center
SMALL OF PIECES OF DATA that travel across the Internet and reassemble when they reach your device. Packets
ONLINE PLATFORMS where people create, share, and view content. Social Media
about BUILFIND and MAINTAINING connections with people Social Networking
information that is false, but not intended to cause harm. Misinformation
information that is true, but is shared to cause harm. Malformation:
false information that is deliberately created or disseminated with the express purpose to cause harm. Disinformation:
Content meant to be funny or entertaining, not to harm—but it can still fool people. Satire or Parody
Using information in the wrong way to frame someone or an issue unfairly Misleading Content
Fake accounts or sources pretending to be real ones. Imposter Content
Entirely false information made to trick or harm people. Fabricated Content
When the headline, image, or caption doesn’t match the actual content. False Connection
Real content but placed in the wrong situation False Context
Real photos, videos, or info that has been edited or changed to deceive. Manipulated Content
following a set of moral principles and value Workplace ethics
using technology responsibly and fairly at work. Digital ethics
Viewing or using data without permission. Unauthorized Data Access
Stealing, leaking, or losing sensitive information. Data Theft and Breaches
Ignoring security rules Cybersecurity Negligence
Using someone else’s work, software, or content without credit or permission. Plagiarism and Copyright Infringement
Installing or sharing unlicensed software illegally. Software Piracy
SEND UNWANTED MESSAGES or tricking people into revealing personal information. Spam and Phishing
Using work computers, internet, or emails for personal or unethical purposes. (USING FOR PERSONAL USE) Misuse of Company Resources
BREAKS INTO SYSTEM, networks, or accounts without authorization. Hacking
MONITORING OR COLLECTING people’s information without their knowledge or consent. Invasion of Privacy
TRICKING people into revealing confidential data or giving access. Social Engineering
Intentionally DAMAGING OR DELETING Digital files, software, or networks. Sabotaging Systems
Creating or using programs that UNFAIRLY TREAT PEOPLE based on bias or prejudice. Discriminatory Algorithms
LYING ABOUT YOUR ABILITIES or certifications. Misrepresentation of Skills
SHARING CONFIDENTIAL INFO or posting inappropriate content about work. Social Media Misuse
Using digital tools to INSULT, THREATEN, or EMBARRASS others. Online Harassment and Bullying
refers to the proper handling, processing, storage, and use of personal information. Data Privacy
Companies often share personal data with third-party service provider Third-Party Management
Converting data into a coded format so that only those with the correct decryption key can access it. This is especially important for data transmitted over the internet. Encryption
A security process that requires more than just a password to access an account, usually combining something you know Multi-Factor Authentication
Three Pillars of Information Security ( CIA ) Confidentiality, Integrity, Availability
Malware includes viruses, worms, Trojans, ransomware, and spyware. Malware (Malicious Software)
A trick where attackers send fake emails or messages that look real to steal your information. Phishing
These come from people within an organization, like employees or contractors, who misuse their access. Insider Threats
These attacks overload a website or network with too much traffic, causing it to crash or slow down. Denial of Service (DoS) and Distributed Denial of Service (DDoS)
These are long-term, targeted attacks where hackers secretly stay inside a network to steal data over time. Usually used against large organizations or governments. These attacks overload a website or network with too much traffic, causing it to crash or slow down.
Happen when unauthorized people gain access to private or sensitive data. Data Breaches
Involve guessing passwords by trying every possible combination Brute Force Attacks
The attacker secretly intercepts communication between two people or systems. Man-in-the-Middle (MITM) Attacks
Hackers insert harmful code into a website’s database through input boxes (like login or search fields). SQL Injection Attacks
Created by: user-1782765
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards