Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
a case that contains electronic components of the computer used to process data
|
system unit
|
|
sometimes called a sytem board, is the main circuit board of the system unit.
|
motherboard
|
|
a small piece of semiconducting material, usually silicon, on which integrated circuits are eteched
|
chip
|
|
a chip with two or more separate processor cores
|
Multi-core processor
|
|
is the component of the processor that directs and coordinates most of the operations in the computer
|
control unit
|
|
(aritmetic logic unit) another component of the processor, performs arithmetic, comparison, and other operations
|
ALU
|
|
generates regular electronic pulse or ticks that set the opertmy pace of components of the system unit
|
system clock
|
|
is measured by number of ticks per second
|
clock speed
|
|
any event or action that could cause a loss of or damage to computer hardware, software, data; information, or processing capability
|
Computer Security
Risk |
|
any illegal act involving a computer
|
Computer Crime
|
|
refers to online or Internet-based illegal acts
|
cybercrime
|
|
although originally a complimentary word for a computer enthusiast now has a derogatory meaning and refers to someone who accesses a computer or network illegally
|
Hacker
|
|
someone who accesses a computer ir netwaor illegally but has the intent of destroy data steadily information, or other malicous action
|
Craker
|
|
the same intent as a craker but does not have the technical skills and knowledge
|
Script Kiddie
|
|
have excellent computer and networking skills and are hired to break into a specific computer and steals its property data and info
|
corporate spies
|
|
someone who uses e-mail as a vehicle for extortion
|
Cyberextortionist
|
|
(short for malicious software) which are programs that act without a user's knowledge and deliberatly alter the computer's operations
|
Malware
|
|
the destruction ewent or prank the program is intended to deliver
|
payload
|
|
an organization or person you believe will not send a virus knowingly
|
Trusted Source
|
|
a group of compromise computers connected to a network such as the Internet that are used as part of a network that attacks other networks
|
Botnet
|
|
one whose owner is unaware the computer is being controlled remotly by an outsider
|
Zombie
|
|
Denial of service an assault wose purpose is to disrupt computer access to an Internet Service such as the web or e-mail
|
DoS Attack
|
|
a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
|
Back door
|
|
a technical intuders use to make thier network or Internet transmission appear legit to a victim computer or network
|
Spoofing
|
|
the use of a computer or its data for an approved or possibly illegal activity
|
Unauthorized Use
|
|
the use of a computer or network without permission
|
unauthorized Access
|
|
the act of stealing computer equipment
|
Hardware Theft
|
|
the act of defacing or destroying computer equipment
|
Hardware vandilism
|
|
occurs when someone steal software media, intentionally erases programs, illegaly copies a program, or illegally registers and or activates a program.
|
Software theft
|
|
right to use the software
|
license agreement
|
|
occers when someone steal personal or confidential information
|
Information Theft
|
|
the process of converting redable info into unreadable characters to prevent unauthorized access
|
Encryption
|
|
decipher, it into a readable form
|
decrypt
|
|
a set of sets that can convert readable plain text into unreadable cipher text
|
encryption algorithim
|
|
a programmed formula that the orginator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
|
encryption key
|
|
an encrypt code that a person, web site or orgnizetion attacks to an electronic message to verify the identity of the message sender
|
Digital Signature
|
|
a notice that guarantees a user or web site is legit
|
Digital Certificate
|
|
(CA) is an authorized oerson or a company that issue and verifies digital certificates
|
Certifacate Authority
|
|
the prolonged malufaction of a computer
|
system failure
|
|
uses ecial electronic compnents to provide a states cannert flow to the computer and other electronic equipment
|
surge protector
|
|
(uninterruptible power supply) a device that contains surge protection circiuts and one or more beatenes that can provide power duringa loss of power
|
UPS
|
|
a duplicate of a file, program or disk that can be used if the original is lost or damage or destoyed
|
backup
|
|
coping the backed up files to there original location on the computer
|
restore
|
|
(wireless Access point) should be configured so that ift does not broadcast a network name
|
WAP
|
|
individuals attept to detect wireless networks the cotebokk computer or mobile divices while diverging veghicle through area they suspect have a wirless network
|
WAr driving
|
|
(Wifi protected Access) a security standard that improves on older securtiy setbacks b authorizing network users and provindinf moral advice encryption technology
|
WPA
|
|
teh most recent network security standard, conforms to the government security standards and uses more sophisticater encryption techniques than WPA
|
802.11i or WPA2
|
|
number system that has 2 digits (0,1)
|
binary number
|
|
smallest unit of data the computer can process
|
bit
|
|
consists of 8 bits represents 256 individual character
|
byte
|
|
electronic components that store instructions ready to be executed by the processor
|
memory
|
|
loses its content when computer is turned off, temporarily
|
volatile memory
|
|
permanent, desn't lose content when computer is turned off
|
nonvolatile memory
|
|
(random access memory) has memory chips that can be read from and written to by the processor
|
RAM memory
|
|
(read only memory) micro chips storing permanent data intructions
|
ROM memory
|
|
small circut board, RAM chip reside here
|
memory module
|
|
on the motherboard, hold memory modules
|
memory slot
|
|
improves processing times
|
Cache
|
|
helps high speed the process of the computer because it stores frequently used intructions and data
|
memory cache
|
|
built directly in the processor chip
|
L1 Cache
|
|
slower the nL1 chache but has a much larger capacity.
|
L2 Cache
|
|
(read only memory)
memory chips storing permanent data and instructions |
ROM
|
|
type of nonvoliate memory that can be erased electronically and rewritten
|
Flash Memory
|
|
complementary metal-oride semiconductor provides high speed and consumes little power
|
CMOS
|
|
is the amount of time it takes the processor to read data, intructions, and information from memory.
|
access time
|
|
is one beillionth of a second
|
nanosecond
|
|
a socket on the motherboard that can hold an adapter card
|
expansion slot
|
|
a circuit board that enhances functions of a component of the system unit and/or provides connection to peripherals
|
adapter card
|
|
nonviolatal memory that can be erased electronically and rewritten
|
flash memory
|
|
a device that connects to the system unit and is contolled by the processor in the computer in the computer
|
peripheral
|
|
also called graphics and, converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen
|
video card
|
|
enhances the sound-generating capabilities and do not require adaptor cards
|
sound card
|
|
a device that attaches to a single port creating multiple ports
|
hub
|
|
converts computer output into a video signal that travles through a cable to the monitor, which displays an image
|
graphics card
|
|
a removable flash memory device, usually no bigger that 1.5 in hight or width, that you insert and remove from a slot in a personal computer, game consule, etc
|
memory card
|
|
the point at which a peripheral attaches to or communicates with a system unit so that the peripherals can send data to or recieve info from a computer
|
port
|
|
universal serial bus port, can connect up to 127 different peripherals together with a single connector
|
USB port
|
|
is similar to a USB port in that it can connect multiple types of devices that require laser datatransmission speeds such as digital video cameras, digital VCRs, etc.
|
FireWall Port
|
|
allows you to attach ScSI (skuzzy) periferals such as disk drives and printers
|
SCSI port
|
|
an exernal device that provides connections to peripherals thropugh parts built into the device
|
port replicator
|
|
is an external device that attaches to a mobile computer or device, contains a power connection and provides connections to periherals; is usually also includes slots for memory card or other devices
|
docking station
|
|
allows the various devices both inside and attached to the system unit to communicate with each other
|
bus
|
|
called front side bus FBS, is part of the mother board and connects the processor to main memory
|
system bus
|
|
FBS, is part of the mother board and connects the processor to main memory
|
frontside bus
|
|
allows the processor to communicate with perpherals
|
expansion bus
|
|
an opening inside the system unit in which you can install additional equipment
|
bay
|
|
a rectangular opening thaat typically holds disk drives
|
drive bay
|
|
the component of the system unit that converts the wall outlet AC power into DC power
|
power supply
|
|
the act of stealing computer equipment
|
hardware teft
|
|
the act of decacing or destroying computer equipment
|
hardware Vandalism
|
|
occurs when someone steals software media, intentionally earases programs illegtally copies a program, or illegally registers and or activates a program
|
software Theft
|
|
right to use software
|
license agreement
|
|
occurs when someone steals personal or confidetial infromation
|
information theft
|
|
the process of converting readable data into unreadable characters to prevent unauthorized access
|
Encryption
|
|
decipher, it into a readable form
|
decrypt
|
|
a set of sets that can convert readable plaintext into unreadable ciphertext
|
encryption algorithm
|
|
an encrypted code that a person, web site or organization attaches to an electronic message to make sure the identity of the message sender
|
Digital Signature
|
|
a notice that guarantes a user or web site is legit
|
Digital Certificate
|
|
(CA) is an authorized person or a company that issues and refiles digital signature
|
Certificate Authority
|
|
the prolonged malufacture of acomputer
|
system failure
|
|
uses electronical components to provide a stable current flow to the computer and other electronic equipment
|
surge protector
|
|
uninterruptible power supply
a device that can provide power during a loss of power |
UPS
|
|
a duplicate of a file, program or disk that can be used if the original is lost damaged or destroyed
|
backup
|
|
copying the backed up files to thier original location on the computer
|
restore
|
|
should be configured so that it does not broadcast a network name (Wireless Access point)
|
WAP
|
|
individuals attenpt to detect wireless networks, the notebook computer or mobile device while drgia vehicl through areas they suspect have a wireless network
|
war driving
|
|
Wifi protected Access
a security standard that improves on older security standards by aythenticaity network users and providing more advanced encryption technology |
WPA
|
|
the most recent network security standard conform the govt. security standard and uses more sophisticated encryption techinques than WPA
|
802.11i
|
|
is an injury or diorder of the muscles, nerves tendens, ligaments, and joints
|
RSI
|
|
you have sore iritered burning itching or dry eyes
|
CVS
|
|
an applied science devoted to incoporating confort efficency and saftey into the design of the workplace
|
ergonomic
|
|
when the computer consumes a persons life
|
computer addiction
|