• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

Kind of sophisticated software that assist a professional user in creating, engineering


architectural and scientific design?

Computer Aided Design

How is date organized in a spreadsheet?



Rows and Column


set or steps that can convert readable plain text to unreadable cipher text

Encrypted algorithm

Alternative to email filtering is to purchase what kind of program that attempts to remove spam before it reaches your inbox

Anti Spam Programs

What transfers from a storage device to memory when a user uses a application

Instruction

banning any material violate constitutional guarantee of free speech and personal right

Content Filtering Component

program that copies itself repeatedly using up resources and possibly shutting down the computer or network

Worm

Utility that detects and protects a computer from unauthorized intrustions

Personal Firewall

gaining unauthorized access or obtaining confidentcial info by taking advantage of the trusting nature of users

Social Engineering

problem w/operating system on desktop and want to repair problems w/hard disk

PC Maintenance

memory chip that can be read from and written to by the process

Main memory/ RAM

items that you need to have get into a room or building (ID,Credit Credit)

Possessed Object

Battery Life Depends on

Usage

component of processor that interprets and carries out the basic instructions that operate a computer

Central Processing Unit

Law passed after 9/11 that allows law enforcement to monitor people activities

PATRIOT ACT.

A group of compromised computers connected to a network that attacks other networks

Bonet

computer or mobil device uses two separate method one after the next to verify the identity of a user

2 Step Verification

computing environment where everyday objects or things are connected to the internet

Internet of things

Numeric Password assigned by company or users

Passcode

Someone who uses internet or network to destroy or damage computer for political reasons

Cyberterrorist

The most common type of volatile memory

RAM

filing taxes online

e-filing

collection of individual related application that is available to together as a unit

Software Sweep

Single font point is what fraction of inch in height?

1/72

PIN is an acromine for

Personal Identification Number

image containing series of distorted characters for a user to identify and enter to verify that is a human

CAPTCHA

Binary System digital represent the electronic state of absence of electrical charge

Zero

Rights to which creator are entitled for their work

Intelectual Property

Scanning on side of Mcdonalds cup

CR Code

Enable you to perform maintenance type task

Utilities

Energy star programs products will save what % less energy?

20-30%