Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
29 Cards in this Set
- Front
- Back
audit trail
|
A log that records in a file both successful and unsucessful
|
|
biometric device
|
Authenticates a person's identity by translating a personal characteristic, fingerprint, into a digital code that is then compared with a digital code stored in the computer.
|
|
code of conduct
|
A written guideline that helps determine whether a specific computer action is ethical or unethical.
|
|
Computer Fraud and Abuse Acts
|
Outlaws unauthorized access to federal government computers and the transmission of harmful computer code such as viruses.
|
|
cookie
|
A small text file that a Web server stores on your computer.
|
|
decrypt
|
Decipher into a readable form.
|
|
denial of service of attack (DoS attack)
|
An assualt on a computer whose purpose is to disrupt access to the Web.
|
|
digital certificate
|
A notice that guarantees a user or a Web site is legitimate.
|
|
digital signature
|
An encrypted code that a person, Web site, or company attaches to an electronic message.
|
|
Electronic Communications Privacy Act (ECPA)
|
Provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
|
|
E-mail filtering
|
A service that blocks e-mail messages from designated sources.
|
|
Encryption
|
A process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Fair Credit Reporting Act
|
Limits the rights of others viewing a credit report to only those with a legitimate business need.
|
|
firewall
|
A security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network.
|
|
green computing
|
Involves reducing the electricity and environmental waste while using a computer.
|
|
Information privacy
|
The right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
inoculate
|
The antivirus program records information (file size, file creation) in a separate inoculation file which the computer will use to detect if a virus tampers with the data.
|
|
Intellectual property rights
|
The rights to which creators are entitled for their work.
|
|
license agreement
|
The right to use the software.
|
|
noise
|
Any unwanted signal that is mixed with the normal voltage entering the computer.
|
|
piracy
|
Unauthorized and illegal duplication of copyrighted software.
|
|
product activation
|
Process of receiving a installation ID number either online or by phone, which allows the user to complete installation
|
|
quarantine
|
A separate area of a hard disk that holds the infected file until the infection can be removed.
|
|
recovery disk
|
A removable disk that contains an uninfected copy of key operating system commands and startup information.
|
|
repetitive strain injury (RSI)
|
An injury or disorder of the muscles, nerves, tendons, ligaments and joints resulting in tendinitis or carpal tunnel syndrome.
|
|
Trojan horse
|
A program that hides within or looks like a legitimate program
|
|
virus signature/ virus definition
|
A known specific pattern of virus code.
|
|
Web filtering software
|
A program that restricts access to specified Web sites.
|
|
worm
|
A program that copies itself repeatedly using up resources and possibly shutting down the computer or network.
|