• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back

Hardware Theft

Is the act of stealing computer hardware

Hardware Vandalism

Is the act of defacing or destroying computer equipment

Real Time Location

Tracks and identify the location of high risk or high value items

Software theft

Occurs when someone steals software media intentionally erases programs,illegally copy programs or illegally registers or activate a program

Piracy

Unauthorized and illegal duplication of copyrighted software

License Agreement

Is the right to use the software

End-user License Agreement

A legal contract between software applications author or publisher and user of that application similar to a rental agreement

Product Activation

Activation process that helps prevent piracy

Information theft

Occurs when someone steals personal or confidential information

Encryption

Is a process of converting readable data into unreadable characters to prevent unauthorized access

Decryption

is require to read encrypted software

Encryption aglorithm

Is a set of steps that can convert readable plain text into unreadable cipher text

Digital signature

Is an encrypted code that a person, Web site or organization attaches to an electronic message to verify the identity of the message sender

Digital certificate

Is a notice that grantees a user or a Web site legitimate

Certificate authority

An authorized person or a company that issues and verifies digital certificate

System failure

Is the prolonged malfunction of a computer

Surge protector

Is use to protect against electrical power variation

Uninterrupted le power supply

Is a device that contains surge protection circuits and one or more batteries that can provide owe during the loss of power

Back up

Is a duplicate version of a file or program that can be used if the original is lost damage or misplace

Off site

A location separate from computer site

Wifi Protected Access

Uses advance encryption techniques to authenticate network users

S02.11i

most recent network security standard that, conforms to government's security standards and uses more sophisticated encryption techniques than WPA

Repetitive Strain injury

Is an injury or disorder of muscles nerves tendons ligaments and joints

Carpal tunnel syndrome

Inflammation of the nerve that connects the forearm to the palm of the wrist

Ergonomics

An applied science devoted to incorporating comfort, efficiency, and safety into he design of items in work places

Computer addiction is characterized by

Craving for computer time


Overjoyed when using the computer


Neglects of family and friends


Irritable when not at the computer


Unable to stop computer activity


Problems at work or school