• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
a case that contains electronic components of the computer used to process data
system unit
sometimes called a sytem board, is the main circuit board of the system unit.
motherboard
a small piece of semiconducting material, usually silicon, on which integrated circuits are eteched
chip
a chip with two or more separate processor cores
Multi-core processor
is the component of the processor that directs and coordinates most of the operations in the computer
control unit
(aritmetic logic unit) another component of the processor, performs arithmetic, comparison, and other operations
ALU
generates regular electronic pulse or ticks that set the opertmy pace of components of the system unit
system clock
is measured by number of ticks per second
clock speed
any event or action that could cause a loss of or damage to computer hardware, software, data; information, or processing capability
Computer Security
Risk
any illegal act involving a computer
Computer Crime
refers to online or Internet-based illegal acts
cybercrime
although originally a complimentary word for a computer enthusiast now has a derogatory meaning and refers to someone who accesses a computer or network illegally
Hacker
someone who accesses a computer ir netwaor illegally but has the intent of destroy data steadily information, or other malicous action
Craker
the same intent as a craker but does not have the technical skills and knowledge
Script Kiddie
have excellent computer and networking skills and are hired to break into a specific computer and steals its property data and info
corporate spies
someone who uses e-mail as a vehicle for extortion
Cyberextortionist
(short for malicious software) which are programs that act without a user's knowledge and deliberatly alter the computer's operations
Malware
the destruction ewent or prank the program is intended to deliver
payload
an organization or person you believe will not send a virus knowingly
Trusted Source
a group of compromise computers connected to a network such as the Internet that are used as part of a network that attacks other networks
Botnet
one whose owner is unaware the computer is being controlled remotly by an outsider
Zombie
Denial of service an assault wose purpose is to disrupt computer access to an Internet Service such as the web or e-mail
DoS Attack
a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
Back door
a technical intuders use to make thier network or Internet transmission appear legit to a victim computer or network
Spoofing
the use of a computer or its data for an approved or possibly illegal activity
Unauthorized Use
the use of a computer or network without permission
unauthorized Access
the act of stealing computer equipment
Hardware Theft
the act of defacing or destroying computer equipment
Hardware vandilism
occurs when someone steal software media, intentionally erases programs, illegaly copies a program, or illegally registers and or activates a program.
Software theft
right to use the software
license agreement
occers when someone steal personal or confidential information
Information Theft
the process of converting redable info into unreadable characters to prevent unauthorized access
Encryption
decipher, it into a readable form
decrypt
a set of sets that can convert readable plain text into unreadable cipher text
encryption algorithim
a programmed formula that the orginator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
encryption key
an encrypt code that a person, web site or orgnizetion attacks to an electronic message to verify the identity of the message sender
Digital Signature
a notice that guarantees a user or web site is legit
Digital Certificate
(CA) is an authorized oerson or a company that issue and verifies digital certificates
Certifacate Authority
the prolonged malufaction of a computer
system failure
uses ecial electronic compnents to provide a states cannert flow to the computer and other electronic equipment
surge protector
(uninterruptible power supply) a device that contains surge protection circiuts and one or more beatenes that can provide power duringa loss of power
UPS
a duplicate of a file, program or disk that can be used if the original is lost or damage or destoyed
backup
coping the backed up files to there original location on the computer
restore
(wireless Access point) should be configured so that ift does not broadcast a network name
WAP
individuals attept to detect wireless networks the cotebokk computer or mobile divices while diverging veghicle through area they suspect have a wirless network
WAr driving
(Wifi protected Access) a security standard that improves on older securtiy setbacks b authorizing network users and provindinf moral advice encryption technology
WPA
teh most recent network security standard, conforms to the government security standards and uses more sophisticater encryption techniques than WPA
802.11i or WPA2
number system that has 2 digits (0,1)
binary number
smallest unit of data the computer can process
bit
consists of 8 bits represents 256 individual character
byte
electronic components that store instructions ready to be executed by the processor
memory
loses its content when computer is turned off, temporarily
volatile memory
permanent, desn't lose content when computer is turned off
nonvolatile memory
(random access memory) has memory chips that can be read from and written to by the processor
RAM memory
(read only memory) micro chips storing permanent data intructions
ROM memory
small circut board, RAM chip reside here
memory module
on the motherboard, hold memory modules
memory slot
improves processing times
Cache
helps high speed the process of the computer because it stores frequently used intructions and data
memory cache
built directly in the processor chip
L1 Cache
slower the nL1 chache but has a much larger capacity.
L2 Cache
(read only memory)
memory chips storing permanent data and instructions
ROM
type of nonvoliate memory that can be erased electronically and rewritten
Flash Memory
complementary metal-oride semiconductor provides high speed and consumes little power
CMOS
is the amount of time it takes the processor to read data, intructions, and information from memory.
access time
is one beillionth of a second
nanosecond
a socket on the motherboard that can hold an adapter card
expansion slot
a circuit board that enhances functions of a component of the system unit and/or provides connection to peripherals
adapter card
nonviolatal memory that can be erased electronically and rewritten
flash memory
a device that connects to the system unit and is contolled by the processor in the computer in the computer
peripheral
also called graphics and, converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen
video card
enhances the sound-generating capabilities and do not require adaptor cards
sound card
a device that attaches to a single port creating multiple ports
hub
converts computer output into a video signal that travles through a cable to the monitor, which displays an image
graphics card
a removable flash memory device, usually no bigger that 1.5 in hight or width, that you insert and remove from a slot in a personal computer, game consule, etc
memory card
the point at which a peripheral attaches to or communicates with a system unit so that the peripherals can send data to or recieve info from a computer
port
universal serial bus port, can connect up to 127 different peripherals together with a single connector
USB port
is similar to a USB port in that it can connect multiple types of devices that require laser datatransmission speeds such as digital video cameras, digital VCRs, etc.
FireWall Port
allows you to attach ScSI (skuzzy) periferals such as disk drives and printers
SCSI port
an exernal device that provides connections to peripherals thropugh parts built into the device
port replicator
is an external device that attaches to a mobile computer or device, contains a power connection and provides connections to periherals; is usually also includes slots for memory card or other devices
docking station
allows the various devices both inside and attached to the system unit to communicate with each other
bus
called front side bus FBS, is part of the mother board and connects the processor to main memory
system bus
FBS, is part of the mother board and connects the processor to main memory
frontside bus
allows the processor to communicate with perpherals
expansion bus
an opening inside the system unit in which you can install additional equipment
bay
a rectangular opening thaat typically holds disk drives
drive bay
the component of the system unit that converts the wall outlet AC power into DC power
power supply
the act of stealing computer equipment
hardware teft
the act of decacing or destroying computer equipment
hardware Vandalism
occurs when someone steals software media, intentionally earases programs illegtally copies a program, or illegally registers and or activates a program
software Theft
right to use software
license agreement
occurs when someone steals personal or confidetial infromation
information theft
the process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
decipher, it into a readable form
decrypt
a set of sets that can convert readable plaintext into unreadable ciphertext
encryption algorithm
an encrypted code that a person, web site or organization attaches to an electronic message to make sure the identity of the message sender
Digital Signature
a notice that guarantes a user or web site is legit
Digital Certificate
(CA) is an authorized person or a company that issues and refiles digital signature
Certificate Authority
the prolonged malufacture of acomputer
system failure
uses electronical components to provide a stable current flow to the computer and other electronic equipment
surge protector
uninterruptible power supply
a device that can provide power during a loss of power
UPS
a duplicate of a file, program or disk that can be used if the original is lost damaged or destroyed
backup
copying the backed up files to thier original location on the computer
restore
should be configured so that it does not broadcast a network name (Wireless Access point)
WAP
individuals attenpt to detect wireless networks, the notebook computer or mobile device while drgia vehicl through areas they suspect have a wireless network
war driving
Wifi protected Access
a security standard that improves on older security standards by aythenticaity network users and providing more advanced encryption technology
WPA
the most recent network security standard conform the govt. security standard and uses more sophisticated encryption techinques than WPA
802.11i
is an injury or diorder of the muscles, nerves tendens, ligaments, and joints
RSI
you have sore iritered burning itching or dry eyes
CVS
an applied science devoted to incoporating confort efficency and saftey into the design of the workplace
ergonomic
when the computer consumes a persons life
computer addiction