• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
hardware theft
the act of stealing computer equipment
real time location system
to track and identify the location of high-risk or high-value items
Software theft
occurs when someone steals software media, intentionally arases programs,illegally copies programs, or illegally registers and/or activates a program
Information Theft
occurs when someone steals personal or conidential information
Encryption
the process of converting readable data into unreadable characters to prevent unauthorized access
digital signature
an encrypted code that a person, Web Site, or organizations attaches to an electronic message to verify the identity of the message sender.
digital certificate
is a notice that guarentees a user o a Web site is legit
system failure
the prolonged malfuntion of a computer
surege protector
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
backup
a duplicate of a file, program, or disk that can be used if the original is lost