• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back
A Control Panel tool that helps you manage security from a single window. (WIN 222)
Action Center
A small, self-contained program you can run in other programs, especially Internet Explorer. (WIN 248)
ActiveX control
A program offered by any software vendor that provides enhancements, such as a toolbar or an improved search feature. (WIN 253)
add-on
A type of user account created when Windows 8 is installed that provides full access to the computer. The administrator can access the files of any user, install software, and change any settings. (WIN 263)
Administrator account
A type of spyware that changes your browser settings to display advertisements. (WIN 235)
adware
A notice about security and maintenance settings that need your attention. (WIN 223)
adware alert message
A program that can detect and remove spyware. (WIN 223)
antispyware program
To turn on the power to a computer and trigger a series of steps and checks as the computer loads the operating system and prepares for use. (WIN 271)
boot
A digital document that verifies the security of a Web site you visit. (WIN 247)
certificate
A small file that records information about you when you visit a Web site. (WIN 255)
cookie
A hacker with criminal intent. (WIN 224)
cracker
An electronic security mark added to a file to verify its authenticity. (WIN 244)
digital signature
A practice spammers use to take advantage of vulnerabilities in your computer to send spam to other computers without your permission. (WIN 240)
email relay
A cookie generated from a Web site you visit; contains information the Web site reuses when you return. (WIN 255)
first-party cookie
A built-in user account that is inactive by default. The Guest account user cannot make any changes to settings or software. (WIN 263)
Guest account
A person that intends to access a computer system without permission. (WIN 224)
hacker
To seize control of a browser. (WIN 251)
hijack
A feature that prevents Internet Explorer from storing data about your browsing session. (WIN 242)
InPrivate Browsing
A user account that accesses only resources on your computer. (WIN 263)
local-only user account
Harmful software such as viruses that can damage your files or disrupt the operation of your computer. (WIN 224)
malicious software (or malware)
A type of user account that provides access to Microsoft cloud computing services; also called a Windows Live account. (WIN 263)
Microsoft account
A bar in Internet Explorer that displays information about security, downloads, and blocked pop-up windows. (WIN 243)
Notification bar
A four-digit number you use to sign in to a Windows account. (WIN 264)
personal information number (PIN)
An attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site. (WIN 240)
phishing
A combination of a picture and three gestures (circles, lines, and taps or clicks) drawn on the picture to identify a user. (WIN 264)
picture password
A window that appears while you are viewing a Web page and advertises a product or service. (WIN 235)
pop-up ad
An Internet Explorer tool that limits or blocks pop-up windows. (WIN 242)
Pop-up Blocker
A feature in Internet Explorer that guards against Web sites trying to save files or install malware on your computer. (WIN 243)
Protected Mode
To move a file to another location on your computer and prevent it from running until you remove or restore the file. (WIN 237)
quarantine
Malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence. (WIN 323)
rootkit
Programming code that performs a series of commands and can be embedded in a Web page. (WIN 249)
script
A feature that makes 8 resistant to malware that starts before the operating system is loaded. (WIN 271)
Secure Boot
An icon that indicates you need permission to access and change a setting. (WIN 223)
security icon
A collection of security settings Internet Explorer uses for a site. (WIN 243)
security zone
A collection of software updates combined in one package. (WIN 230)
service pack (SP)
Junk e-mail. (WIN 240)
spam
A fraudulent site posing as a legitimate one. (WIN 244)
spoofed Web site
Software that secretly gathers information about you and your computer actions and passes it to advertisers and others. (WIN 222)
spyware
A user account designed for everyday computing that does not allow changes to the computer that affect all users. (WIN 263)
Standard account
To make sure data on two devices match. (WIN 263)
synchronize (or sync)
A series of letters, numbers, spaces, and symbols that you provide to access your files, applications, and other resources on a computer. (WIN 264)
text password
A cookie generated from Web site advertisers, who might use them to track your Web use for marketing purposes. (WIN 255)
third-party cookie
Malware that hides inside another program, often one downloaded from the Web. (WIN 232)
Trojan horse
To verify that you have an account on a computer when you want to synchronize your accounts on your multiple computing devices. (WIN 264)
trust
A boot method that starts a computer faster and in a more secure way than previous methods. (WIN 271)
Unified Extensible Firmware Interface (UEFI)
A change to software that can prevent or repair problems, enhance the security of a computer, or improve a computer’s performance. (WIN 230)
update
A collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings. (WIN 262)
user account
A feature that displays warnings and asks for confirmation to help prevent unauthorized changes to your computer. (WIN 270)
User Account Control (UAC)
A program attached to a file that runs when you open the file and copies itself to infect a computer. (WIN 222)
virus
Characteristics of a known virus. (WIN 232)
virus definition
On a Web page, a transparent image that invisibly tracks Web site usage. (WIN 259)
Web beacon
An operating system tool that checks for updates to system software. (WIN 222)
Windows Update
Harmful computer code that spreads without your interaction. (WIN 232)
worm