Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
hardware theft
|
the theft of computer hardware
|
|
full disk encryption (FDE)
|
a technology that encrypts everything stored on a storage medium automatically,without permission
|
|
self encryption hard drive
|
a hard drive that uses full encryption (FDE)
|
|
ruggedized devices
|
a device that is used to withstand much more physical abuse than a conventional device
|
|
surge suppressor
|
a device used to protect a computer system from damage due to electrical fluctuations
|
|
uninterruptable power supply (UPS)
|
a device containing a built in battery that provides continuous power to a computer and other connected components when the electricity goes out
|
|
disaster recovery plan
|
a written plan that describes the steps a company will take following the occurance of a disaster
|
|
software piracy
|
unauthorized copying of a computer software
|
|
digital counterfeiting
|
the use of computer or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items
|
|
electric profilling
|
using electric means to collect a variety of in depth information about an individual,name, address, income
|
|
throw away email address
|
an email address used only for non essential purposes and activities that may result in spam
|
|
email filter
|
a tool that automatically sorts your incoming email messages based on specific criteria
|
|
computer monitoring system
|
used to record keystrokes, logging the programs or web site accessed, or otherwise monitoring someone's computer activity
|
|
Presence technology
|
technology that enables one computing device (such as a computer or mobile phone) to identify the current status of another device on the same network
|