Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Hardware Theft
|
The act of stealing computer equipment.
|
|
Hardware Vandalism
|
The act of defacing or destroying computer equipment.
|
|
Software Theft
|
Occurs when someone steals software media, intentionally ereases programs, illegally copies a program, or illegally registers and or activates a program.
|
|
License Agreement
|
The right to use the software.
|
|
Information Theft
|
Occurs when someone steals personal or confidential information.
|
|
Encryption
|
The process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Decrypt
|
Decipher it into a readable form.
|
|
Encryption Algorithm
|
A set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
Encryption Key
|
A Programed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
Plaintext
|
Unencrypted, readable data.
|
|
Ciphertext
|
The encrypted (scrambled) data.
|
|
Digital Signature
|
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
|
|
Digital Certificate
|
A notice that guarantees a user or a website is legitimate.
|
|
Certificate Authority
|
An authorized person or a company that issues and verifies digital certificates.
|
|
System Failure
|
The prolonged malfunction of a computer.
|
|
Surge Protector
|
uses special electronic components to provide a stable current flow to the computer and other electronic equipment.
|
|
UPS
|
(Uninterruptible Power Supply)
A device that contains surge protection circuits and one or more batteries that can provide power during a loss of power. |
|
backup
|
A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
|
Restore
|
Copying the backed up files to their original location on the computer.
|
|
WAP
|
Does not broadcast network name and only certain devices can access it.
|
|
War Driving
|
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
WPA
|
(Wi-Fi Protected Acces)
A security standard that improves an older security standard by authenticating network users and providing more advanced encryption techniques. |
|
pues...
|
well..., because, for, since, then
|