Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
Kind of sophisticated software that assist a professional user in creating, engineering architectural and scientific design? |
Computer Aided Design |
|
How is date organized in a spreadsheet? |
Rows and Column
|
|
set or steps that can convert readable plain text to unreadable cipher text |
Encrypted algorithm |
|
Alternative to email filtering is to purchase what kind of program that attempts to remove spam before it reaches your inbox |
Anti Spam Programs |
|
What transfers from a storage device to memory when a user uses a application |
Instruction |
|
banning any material violate constitutional guarantee of free speech and personal right |
Content Filtering Component |
|
program that copies itself repeatedly using up resources and possibly shutting down the computer or network |
Worm |
|
Utility that detects and protects a computer from unauthorized intrustions |
Personal Firewall |
|
gaining unauthorized access or obtaining confidentcial info by taking advantage of the trusting nature of users |
Social Engineering |
|
problem w/operating system on desktop and want to repair problems w/hard disk |
PC Maintenance |
|
memory chip that can be read from and written to by the process
|
Main memory/ RAM |
|
items that you need to have get into a room or building (ID,Credit Credit) |
Possessed Object |
|
Battery Life Depends on |
Usage |
|
component of processor that interprets and carries out the basic instructions that operate a computer |
Central Processing Unit |
|
Law passed after 9/11 that allows law enforcement to monitor people activities |
PATRIOT ACT. |
|
A group of compromised computers connected to a network that attacks other networks |
Bonet |
|
computer or mobil device uses two separate method one after the next to verify the identity of a user |
2 Step Verification |
|
computing environment where everyday objects or things are connected to the internet |
Internet of things |
|
Numeric Password assigned by company or users |
Passcode |
|
Someone who uses internet or network to destroy or damage computer for political reasons |
Cyberterrorist |
|
The most common type of volatile memory |
RAM |
|
filing taxes online |
e-filing |
|
collection of individual related application that is available to together as a unit |
Software Sweep |
|
Single font point is what fraction of inch in height? |
1/72 |
|
PIN is an acromine for |
Personal Identification Number |
|
image containing series of distorted characters for a user to identify and enter to verify that is a human |
CAPTCHA |
|
Binary System digital represent the electronic state of absence of electrical charge |
Zero |
|
Rights to which creator are entitled for their work |
Intelectual Property |
|
Scanning on side of Mcdonalds cup |
CR Code |
|
Enable you to perform maintenance type task |
Utilities |
|
Energy star programs products will save what % less energy? |
20-30% |