Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Hardware Theft |
Is the act of stealing computer hardware |
|
Hardware Vandalism |
Is the act of defacing or destroying computer equipment |
|
Real Time Location |
Tracks and identify the location of high risk or high value items |
|
Software theft |
Occurs when someone steals software media intentionally erases programs,illegally copy programs or illegally registers or activate a program |
|
Piracy |
Unauthorized and illegal duplication of copyrighted software |
|
License Agreement |
Is the right to use the software |
|
End-user License Agreement |
A legal contract between software applications author or publisher and user of that application similar to a rental agreement |
|
Product Activation |
Activation process that helps prevent piracy |
|
Information theft |
Occurs when someone steals personal or confidential information |
|
Encryption |
Is a process of converting readable data into unreadable characters to prevent unauthorized access |
|
Decryption |
is require to read encrypted software |
|
Encryption aglorithm |
Is a set of steps that can convert readable plain text into unreadable cipher text |
|
Digital signature |
Is an encrypted code that a person, Web site or organization attaches to an electronic message to verify the identity of the message sender |
|
Digital certificate |
Is a notice that grantees a user or a Web site legitimate |
|
Certificate authority |
An authorized person or a company that issues and verifies digital certificate |
|
System failure |
Is the prolonged malfunction of a computer |
|
Surge protector |
Is use to protect against electrical power variation |
|
Uninterrupted le power supply |
Is a device that contains surge protection circuits and one or more batteries that can provide owe during the loss of power |
|
Back up |
Is a duplicate version of a file or program that can be used if the original is lost damage or misplace |
|
Off site |
A location separate from computer site |
|
Wifi Protected Access |
Uses advance encryption techniques to authenticate network users |
|
S02.11i |
most recent network security standard that, conforms to government's security standards and uses more sophisticated encryption techniques than WPA |
|
Repetitive Strain injury |
Is an injury or disorder of muscles nerves tendons ligaments and joints |
|
Carpal tunnel syndrome |
Inflammation of the nerve that connects the forearm to the palm of the wrist |
|
Ergonomics |
An applied science devoted to incorporating comfort, efficiency, and safety into he design of items in work places |
|
Computer addiction is characterized by |
Craving for computer time Overjoyed when using the computer Neglects of family and friends Irritable when not at the computer Unable to stop computer activity Problems at work or school |