• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/29

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

29 Cards in this Set

  • Front
  • Back
audit trail
A log that records in a file both successful and unsucessful
biometric device
Authenticates a person's identity by translating a personal characteristic, fingerprint, into a digital code that is then compared with a digital code stored in the computer.
code of conduct
A written guideline that helps determine whether a specific computer action is ethical or unethical.
Computer Fraud and Abuse Acts
Outlaws unauthorized access to federal government computers and the transmission of harmful computer code such as viruses.
cookie
A small text file that a Web server stores on your computer.
decrypt
Decipher into a readable form.
denial of service of attack (DoS attack)
An assualt on a computer whose purpose is to disrupt access to the Web.
digital certificate
A notice that guarantees a user or a Web site is legitimate.
digital signature
An encrypted code that a person, Web site, or company attaches to an electronic message.
Electronic Communications Privacy Act (ECPA)
Provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
E-mail filtering
A service that blocks e-mail messages from designated sources.
Encryption
A process of converting readable data into unreadable characters to prevent unauthorized access.
Fair Credit Reporting Act
Limits the rights of others viewing a credit report to only those with a legitimate business need.
firewall
A security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network.
green computing
Involves reducing the electricity and environmental waste while using a computer.
Information privacy
The right of individuals and companies to deny or restrict the collection and use of information about them.
inoculate
The antivirus program records information (file size, file creation) in a separate inoculation file which the computer will use to detect if a virus tampers with the data.
Intellectual property rights
The rights to which creators are entitled for their work.
license agreement
The right to use the software.
noise
Any unwanted signal that is mixed with the normal voltage entering the computer.
piracy
Unauthorized and illegal duplication of copyrighted software.
product activation
Process of receiving a installation ID number either online or by phone, which allows the user to complete installation
quarantine
A separate area of a hard disk that holds the infected file until the infection can be removed.
recovery disk
A removable disk that contains an uninfected copy of key operating system commands and startup information.
repetitive strain injury (RSI)
An injury or disorder of the muscles, nerves, tendons, ligaments and joints resulting in tendinitis or carpal tunnel syndrome.
Trojan horse
A program that hides within or looks like a legitimate program
virus signature/ virus definition
A known specific pattern of virus code.
Web filtering software
A program that restricts access to specified Web sites.
worm
A program that copies itself repeatedly using up resources and possibly shutting down the computer or network.