Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Our Digital World 8.2

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
encryption   The process of using a key to convert readable information into unreadable information to prevent unauthorized access or usage.  
🗑
public key   A code key used in encryption. Creates an encrypted message that is decrypted by a private key.  
🗑
private key   A code key used in encryption that is known to only one or both parties when exchanging secure communications.  
🗑
public key encryption   A system of encrypting and decrypting data using a public key and private key combination.  
🗑
Wi-Fi Protected Access (WPA)   An encryption standard used to protect data sent across a wireless network. Designed by the Wi-Fi Alliance to overcome the security limitations of Wired Equivalent Privacy (WEP).  
🗑
Wired Equivalent Privacy (WEP)   An encryption standard used to protect data sent across a wireless network. An older and less secure technology than Wi-Fi Protected Access (WPA).  
🗑
Wi-Fi Protected Access 2 (WPA2)   A stronger, more complex encryption standard than WPA. WPA2 became mandatory in 2006 for all new equipment certified by the Wi-Fi Alliance.  
🗑
malware   Collectively, damaging computer programs such as viruses and spyware, which can do anything from displaying pop-up window advertisements to destroying your data or tracking your online activities.  
🗑
spam   Mass emails sent to those who haven’t requested them, usually for the purpose of advertising or fraud.  
🗑
virus   A type of computer program that is placed on your computer without your knowledge. The key characteristic of a virus is that it can reproduce itself and spread from computer to computer by attaching itself to another, seemingly innocent, file.  
🗑
worm   A self-replicating computer program with the ability to send out copies of itself to every computer on a network. Worms are usually designed to damage the network, in many cases by simply clogging up the network’s bandwidth and slowing its performance.  
🗑
Trojan horse   Malware that masquerades as a useful program. When you run the seemingly useful program, you let this type of malware into your system. It opens a “back door” through which hackers can access your computer.  
🗑
macro virus   A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets.  
🗑
logic bomb virus   A piece of code that is placed in a software system to set off a series of potentially damaging events if certain conditions are met.  
🗑
rootkit   A set of programs or utilities designed to allow a hacker to control a victim computer’s hardware and software and permit a hacker to monitor the user’s actions.  
🗑
botnet   A group of computers that have been compromised (zombies or bots) so they can forward communications to a controlling computer.  
🗑
zombie   A computer compromised by malware that becomes part of a botnet and is used to damage or compromise other computers. Also called a bot.  
🗑
spyware   Software that tracks activities of a computer user without the user’s knowledge.  
🗑
adware   Software that is supported by advertising and is capable of downloading and installing spyware.  
🗑
scareware   A scam where an online warning or popup convinces a user that his or her computer or mobile device is infected with malware or has another problem that can be fixed by purchasing and downloading software, which may do nothing or install malware.  
🗑
ransomware   A scam where a user’s computer is locked or data encrypted with a message from the malware creator demanding payment to restore access or data.  
🗑
Transport Layer Security (TLS)   A protocol that protects data, such as credit card numbers as they are being transmitted between a customer and online vendor or payment company.  
🗑
Secure Socket Layer (SSL)   A cryptographic protocol that is required for creating Transport Layer Security (TLS).  
🗑
cookie   A small file stored on your computer by a web server to track information about you and your activities.  
🗑
phishing   The practice of sending email that appears to be from a legitimate organization in an attempt to convince the reader to reveal personal information.  
🗑
spear-phishing   A targeted phishing attack sent to individuals employed by certain companies for the purpose of obtaining trade secrets or other confidential information, leading to financial gain for the hacker.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: softcrylic
Popular Computers sets