• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Hardware Theft
The act of stealing computer equipment.
Hardware Vandalism
The act of defacing or destroying computer equipment.
Software Theft
Occurs when someone steals software media, intentionally ereases programs, illegally copies a program, or illegally registers and or activates a program.
License Agreement
The right to use the software.
Information Theft
Occurs when someone steals personal or confidential information.
Encryption
The process of converting readable data into unreadable characters to prevent unauthorized access.
Decrypt
Decipher it into a readable form.
Encryption Algorithm
A set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Key
A Programed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Plaintext
Unencrypted, readable data.
Ciphertext
The encrypted (scrambled) data.
Digital Signature
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Digital Certificate
A notice that guarantees a user or a website is legitimate.
Certificate Authority
An authorized person or a company that issues and verifies digital certificates.
System Failure
The prolonged malfunction of a computer.
Surge Protector
uses special electronic components to provide a stable current flow to the computer and other electronic equipment.
UPS
(Uninterruptible Power Supply)
A device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
backup
A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Restore
Copying the backed up files to their original location on the computer.
WAP
Does not broadcast network name and only certain devices can access it.
War Driving
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
WPA
(Wi-Fi Protected Acces)
A security standard that improves an older security standard by authenticating network users and providing more advanced encryption techniques.
pues...
well..., because, for, since, then