Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Vocab for my IDT class.

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Computer security risk   Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.  
🗑
Computer crime *   Any illegal act involving a computer.  
🗑
Cybercrime *   Online or Internet-based illegal acts.  
🗑
Hacker*   Someone who accesses a computer or network illegally.  
🗑
Cyber extortionist*   Someone who uses e-mail as a vehicle for extortion.  
🗑
Cyberterrorist*   Someone who uses the Internet or network to destroy or damage computers for political reasons.  
🗑
Virus*   Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission.  
🗑
Worm*   Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system.  
🗑
Trojan horse*   Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program.  
🗑
Malware   Short for malicious software; programs that act without a user’s knowledge and deliberately alter a computer’s operations.  
🗑
Antivirus program   Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.  
🗑
Bot   Program that performs a repetitive task on a network.  
🗑
Botnet*   Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.  
🗑
Firewalls*   Hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.  
🗑
Intrusion detection software   Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.  
🗑
Honeypot*   Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network.  
🗑
CAPTCHA*   Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Websites to provide further protection for a user’s password by verifying that user input is not computer generated.  
🗑
Personal identification number   Numeric password, either assigned by a company or selected by a user.  
🗑
Digital forensics*   The discovery, collection, and analysis of evidence found on computers and networks.  
🗑
License agreement   An agreement issued by a software manufacturer that gives the user the right to use the software.  
🗑
Information theft   Computer security risk that occurs when someone steals personal or confidential information.  
🗑
Encryption*   The process of encoding data and information to an unreadable form.  
🗑
Decrypt*   Process of deciphering encrypted data into a readable form.  
🗑
Digital certificate*   A notice that guarantees a user or a Website is legitimate.  
🗑
Noise*   Electrical disturbance that can degrade communications.  
🗑
Power surge   Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts.  
🗑
Surge protector   Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment.  
🗑
Backup   Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.  
🗑
Ergonomics*   The science of incorporating comfort, efficiency, and safety into the design of the workplace.  
🗑
Computer ethics*   Moral guidelines that govern the use of computers and information systems.  
🗑
Morals   A person’s standards or beliefs pertaining to their subconscious.  
🗑
Intellectual property rights*   Rights to which creators are entitled for their work.  
🗑
Copyrights*   Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.  
🗑
Code of conduct   Written guide-lines that help determine whether a specific computer action is ethical or unethical.  
🗑
Spam   Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.  
🗑
Employee monitoring   The use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: amanning
Popular Computers sets