• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
RADAR TERMS
(5)
•Doppler Affect: Perceived change in Frequency & Amplitude based on the movement of object (think of car moving on a highway & passing you while you standing still).
•PRI: Pulse Repetition Interval (Quiet Time in between)
•PRF: Pulse Repetition Frequency (How many pulses I am sending per second)
•PW: Pulse Width from trailing edge to leading edge (Transmission Time)
•BW: band Width, range of frequency.
Malicious Mobile Code (MMC)
(4)
A software program designed to move across computers & network, in order to modify computer system without consent of owner/operator. It includes all harmful programs
1.Viruses (copy itself & infect )
2.Worm (replicating malware/send copies across network)
3.Trojan ( Non-Replicating malware that appears to do a desired function while allow a backdoor to your PC)
4.Research Only malicious code

Note: Phishing: is a criminally Fraudulent not a MMC
Other Malicious
1.Script Attacks
2.Rouge Internet code
3.Mixture (more sophisticated/Bundle)
4.Active X (technology used to run program over the internet/ can do anything it wants to your PC if you allow it a control to execute on your PC)
5.Hoax Viruses (chain of email claiming gloom & doom)
6.Macro Viruses (Virus that is written in Macro Language , e.g. Word Document, infect when you open it/ Most common type & cost companies thousands of dollar)
7.Backdoor: simple Trojan
CARO Naming Convention
(5)
Computer Antivirus Research Organization; made a standard naming for virus. Each virus will have a :
1.Family name
2.Group name
3.Major variant
4.Minor variant
5.Modifier
Note: No naming after location/ company/brand name/ no invention for existing name
Computer languages
(3)
1.Machine Language (set of instructions by CPU/Lowest representation of instructions)
2.Assembly Language (Low level programing language/ uses mnemonic codes)
3.High Level language (programming Language with strong abstractions from details of the computer, e.g. C++)
Important Ocean/Sea Straits
(5)
•Strait of Hormuz: Between Persian Gulf & Gulf of Oman
•Strait of Gibraltar: Between Mediterranean & Atlantic
•Bab-El- Mandeb: Between Red Sea & Gulf of Aden
•Dardanelles: Between Sea of Marmora & Aegean Sea
•Bosporus: Between Black sea & Sea of Marmora
Important Ocean/Sea bodies
(10)
•Mediterranean sea
•Red sea / Suez Canal
•Black sea / Caspian Sea
•Marmora Sea
•Aegean sea
•Gulf of Aden
•Gulf of Oman
•Arabian sea
•Persian Gulf
•Gulf of Aqaba/Suez
Types of Fractures
1.Open Fracture
2.Closed Fracture
Cross Domain Process
(3)
A Reliable Review Process for transferring from High to low side to protect information.
1.Manual (human)
2.Automated (program)
3.Combination of both (Preferred Method)
Characteristics of Antennas
(4)
1.Reciprocity: Interchangeability between transmission & receiving
2.Gain: Focuses radiated RF into narrower Pattern
•Higher Gain, the smaller effective angle of use
•Lower the gain, the bigger the effective angle of use
3.Polarization: Orientation of Electric Field vector of electromagnetic wave produced by antenna: Vertical/Horizontal/Elliptical
4.Radiation Resistance: If placed instead of antenna, would consume same amount of power radiated by an antenna.
Hackers Attack
(7)
1.Network Enumeration: Start point for hackers/ names, groups, network info are gathered.
2.Buffer Overflow: Exploitation by overloading Buffer
3.SQL Injection: Exploitation by injecting a code
4.Dictionary Attack: By a set list of codes/words
5.Brute Force Attack: There is no sit list/ All possible Keys
6.Privilege Escalation : To gain access to resources blocked from users (root Level Incident)
7.Social Engineering: act of manipulating people into performing certain actions.
Space Terms
(3)
•Astrometry: Branch of astronomy that deals with measurements of Celestial bodies.
•Earth Orientation Parameters (EOP): Earth orientations not even. Any motion in/on Earth causes slowdown or speedup of rotation, or change of rotation axis. EOP describe the relationship of mass activity (these irregularities) in/on Earth & measurements in time
•GPS: Primary source for Precise Time & Time Interval (PTTI). Precise time is required for numerous systems and in support of critical missions.