• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/65

Click to flip

65 Cards in this Set

  • Front
  • Back
RSI repetitive strain injury
Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
Computer Vision Syndrome (CVS)
Eyestrain due to prolonged computer usage.
ergonomics
The science of incorporating comfort, efficiency, and safety into the design of the workplace.
computer addiction
Growing health problem that occurs when the computer consumes someone's entire social life
computer ethics
Moral guidelines that govern the use of computers and information systems.
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
computer crime
any illegal act involving a computer.
cybercrime
Online or Internet-based illegal acts.
hacker
Someone who accesses a computer or network illegally.
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
script kiddie
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge.
corporate spies
hired to break into specific computer and stesal its propietary data and information.
cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
malware
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
payload
Destructive event or prank a malicious-logic program is intended to deliver.
trusted source
Company or person a user believes will not send a virus-infected file knowingly.
botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
zombie
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.
back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.
processed object
any item that6 you must carry to gain access to a computer or computer facility.
biometric device
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
digital forensics
The discovery, collection, and analysis of evidence found on computers and networks.
Hardware Theft
The act of stealing computer equipment.
Hardware Vandalism
The act of defacing or destroying computer equipment
Software Theft
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
Information Theft
Computer security risk that occurs when someone steals personal or confidential information.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Decrypt
Process of deciphering encrypted data into a readable form.
Encryption algorthm
Set of steps that can convert readable plaintext into unreadable ciphertext.
Encrytion Key
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertex
Plain text
Unencrypted, readable data
ciphertext
Encrypted (scrambled) data.
Digital Signature
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Digital Certification
A notice that guarantees a user or a Web site is legitimate.
Certificate Authority
Authorized person or company that issues and verifies digital certificates.
system Failure
Prolonged malfunction of a computer.
Surge Failure
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
Surger protector
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
UPS
uninterruptible power supply (UPS)
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
See page575
Backup
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
restore
To copy backed up files by copying them to their original location on the computer.
WPA
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
War Driving
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques
WPA
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
War Driving
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques
802.11i
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
National Press Photograghers
Opposes any manibulation of an image
Intellectual Property Rights
right in which creators anr entiled for thier work
Copyright
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Green Computing
Computer usage that reduces the electricity and environmental waste involved in using a computer.
Energy Star Program
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices.
Information Privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
Electromic Profile
online profile
Cookie
Small text file that a Web server stores on a computer.
Spyware
Program placed on a computer without the user's knowledge that secretly collects information about the user.
Adware
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
Spam
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
phishing
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
pharming
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
social engineering
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
employee Monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
content filtering
Process of restricting access to certain material on the Web.