Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

DSST Computers #10

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
802.11i   Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.  
🗑
access control   Security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.  
🗑
Adware   Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.  
🗑
anti-spam program   Program that attempts to remove spam before it reaches a user's inbox.  
🗑
antivirus program   Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.  
🗑
audit trail   Computer file that records both successful and unsuccessful access attempts.  
🗑
Backup   Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.  
🗑
biometric device   Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.  
🗑
biometric payment   Payment method where the customer's fingerprint is read by a fingerprint reader that is linked to a payment method such as a checking account or credit card.  
🗑
Botnet   Group of compromised computers connected to a network such as the internet that is being used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.  
🗑
CAPTCHA   Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.  
🗑
certificate authority (CA)   Authorized person or company that issues and verifies digital certificates.  
🗑
Clickjacking   Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program.  
🗑
computer addiction   Growing health problem that occurs when the computer consumes someone's entire social life.  
🗑
computer crime   any illegal act involving a computer.  
🗑
computer ethics   Moral guidelines that govern the use of computers and information systems.  
🗑
computer vision syndrome   Eyestrain due to prolonged computer usage.  
🗑
content filtering   Process of restricting access to certain material on the Web.  
🗑
Cookie   Small text file that a Web server stores on a computer.  
🗑
copyright   Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.  
🗑
Cracker   Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.  
🗑
Cybercrime   Online or Internet-based illegal acts.  
🗑
Decrypt   Process of deciphering encrypted data into a readable form.  
🗑
denial of service attack   Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.  
🗑
e-mail filtering   Service that blocks e-mail messages from designated sources.  
🗑
employee monitoring   The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.  
🗑
Encryption   Process of converting readable data into unreadable characters to prevent unauthorized access.  
🗑
encryption algorithm   Set of steps that can convert readable plaintext into unreadable ciphertext.  
🗑
encryption key   Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.  
🗑
ENERGY STAR program   Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices.  
🗑
Firewall   Hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.  
🗑
green computing   Computer usage that reduces the electricity and environmental waste involved in using a computer.  
🗑
Hacker   Someone who accesses a computer or network illegally.  
🗑
hardware theft   The act of stealing computer equipment.  
🗑
hardware vandalism   The act of defacing or destroying computer equipment.  
🗑
information privacy Right of individuals and compani   es to deny or restrict the collection and use of information about them.  
🗑
information theft   Computer security risk that occurs when someone steals personal or confidential information.  
🗑
intellectual property rights   Rights to which creators are entitled for their work.  
🗑
intrusion detection software   Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.  
🗑
license agreement   An agreement issued by a software manufacturer that gives the user the right to use the software.  
🗑
Malware   Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.  
🗑
Password   Private combination of characters associated with a user name that allows access to certain computer resources.  
🗑
Payload   Destructive event or prank a malicious-logic program is intended to deliver.  
🗑
personal firewall utility   Utility that detects and protects a personal computer and its data from unauthorized intrusions.  
🗑
personal identification number (PIN)   Numeric password, either assigned by a company or selected by a user.  
🗑
Pharming   Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.  
🗑
phishing filter   Program that warns or blocks you from potentially fraudulent or suspicious Web sites.  
🗑
Piracy   Unauthorized and illegal duplication of copyrighted material.  
🗑
possessed object   Any item that a user must carry to gain access to a computer or computer facility.  
🗑
product activation   Process that attempts to prevent software piracy by requiring users to provide a software product's 25-character identification number in order to receive an installation identification number.  
🗑
Quarantine   Separate area of a hard disk that holds the infected file until a virus can be removed.  
🗑
real time location system (RTLS)   Safeguard used by some businesses to track and identify the location of high-risk or high-value items.  
🗑
repetitive strain injury (RSI)   Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.  
🗑
Restore   To copy backed up files by copying them to their original location on the computer.  
🗑
Rootkit   Program that hides in a computer and allows someone from a remote location to take full control of the computer.  
🗑
secure site   Web site that uses encryption techniques to secure its data.  
🗑
social engineering   Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.  
🗑
software theft   Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.  
🗑
Spam   Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.  
🗑
Spyware   Program placed on a computer without the user's knowledge that secretly collects information about the user.  
🗑
surge protector   Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. Also called a surge suppressor.  
🗑
system failure   Prolonged malfunction of a computer.  
🗑
Trojan horse   Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program.  
🗑
trusted source   Company or person a user believes will not send a virus-infected file knowingly.  
🗑
unauthorized access   use of a computer or network without permission.  
🗑
unauthorized use   Use of a computer or its data for unapproved or possibly illegal activities.  
🗑
uninterruptible power supply (UPS)   Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.  
🗑
Virus   Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.  
🗑
virus definition   Known specific pattern of virus code. Also called virus signature.  
🗑
virus hoax   E-mail message that warns users of a nonexistent virus or other malware.  
🗑
virus signature   Known specific pattern of virus code. Also called virus definition.  
🗑
war driving   Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.  
🗑
Web filtering software   Program that restricts access to certain material on the Web.  
🗑
Wi-Fi Protected Access (WPA)   Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.  
🗑
Worm   Program that copies itself repeatedly, using up system resources and possibly shutting down the system.  
🗑
Zombie   A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: pinetreeacademy
Popular Computers sets