Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
A Control Panel tool that helps you manage security from a single window. (WIN 222)
|
Action Center
|
|
A small, self-contained program you can run in other programs, especially Internet Explorer. (WIN 248)
|
ActiveX control
|
|
A program offered by any software vendor that provides enhancements, such as a toolbar or an improved search feature. (WIN 253)
|
add-on
|
|
A type of user account created when Windows 8 is installed that provides full access to the computer. The administrator can access the files of any user, install software, and change any settings. (WIN 263)
|
Administrator account
|
|
A type of spyware that changes your browser settings to display advertisements. (WIN 235)
|
adware
|
|
A notice about security and maintenance settings that need your attention. (WIN 223)
|
adware alert message
|
|
A program that can detect and remove spyware. (WIN 223)
|
antispyware program
|
|
To turn on the power to a computer and trigger a series of steps and checks as the computer loads the operating system and prepares for use. (WIN 271)
|
boot
|
|
A digital document that verifies the security of a Web site you visit. (WIN 247)
|
certificate
|
|
A small file that records information about you when you visit a Web site. (WIN 255)
|
cookie
|
|
A hacker with criminal intent. (WIN 224)
|
cracker
|
|
An electronic security mark added to a file to verify its authenticity. (WIN 244)
|
digital signature
|
|
A practice spammers use to take advantage of vulnerabilities in your computer to send spam to other computers without your permission. (WIN 240)
|
email relay
|
|
A cookie generated from a Web site you visit; contains information the Web site reuses when you return. (WIN 255)
|
first-party cookie
|
|
A built-in user account that is inactive by default. The Guest account user cannot make any changes to settings or software. (WIN 263)
|
Guest account
|
|
A person that intends to access a computer system without permission. (WIN 224)
|
hacker
|
|
To seize control of a browser. (WIN 251)
|
hijack
|
|
A feature that prevents Internet Explorer from storing data about your browsing session. (WIN 242)
|
InPrivate Browsing
|
|
A user account that accesses only resources on your computer. (WIN 263)
|
local-only user account
|
|
Harmful software such as viruses that can damage your files or disrupt the operation of your computer. (WIN 224)
|
malicious software (or malware)
|
|
A type of user account that provides access to Microsoft cloud computing services; also called a Windows Live account. (WIN 263)
|
Microsoft account
|
|
A bar in Internet Explorer that displays information about security, downloads, and blocked pop-up windows. (WIN 243)
|
Notification bar
|
|
A four-digit number you use to sign in to a Windows account. (WIN 264)
|
personal information number (PIN)
|
|
An attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a Web site. (WIN 240)
|
phishing
|
|
A combination of a picture and three gestures (circles, lines, and taps or clicks) drawn on the picture to identify a user. (WIN 264)
|
picture password
|
|
A window that appears while you are viewing a Web page and advertises a product or service. (WIN 235)
|
pop-up ad
|
|
An Internet Explorer tool that limits or blocks pop-up windows. (WIN 242)
|
Pop-up Blocker
|
|
A feature in Internet Explorer that guards against Web sites trying to save files or install malware on your computer. (WIN 243)
|
Protected Mode
|
|
To move a file to another location on your computer and prevent it from running until you remove or restore the file. (WIN 237)
|
quarantine
|
|
Malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence. (WIN 323)
|
rootkit
|
|
Programming code that performs a series of commands and can be embedded in a Web page. (WIN 249)
|
script
|
|
A feature that makes 8 resistant to malware that starts before the operating system is loaded. (WIN 271)
|
Secure Boot
|
|
An icon that indicates you need permission to access and change a setting. (WIN 223)
|
security icon
|
|
A collection of security settings Internet Explorer uses for a site. (WIN 243)
|
security zone
|
|
A collection of software updates combined in one package. (WIN 230)
|
service pack (SP)
|
|
Junk e-mail. (WIN 240)
|
spam
|
|
A fraudulent site posing as a legitimate one. (WIN 244)
|
spoofed Web site
|
|
Software that secretly gathers information about you and your computer actions and passes it to advertisers and others. (WIN 222)
|
spyware
|
|
A user account designed for everyday computing that does not allow changes to the computer that affect all users. (WIN 263)
|
Standard account
|
|
To make sure data on two devices match. (WIN 263)
|
synchronize (or sync)
|
|
A series of letters, numbers, spaces, and symbols that you provide to access your files, applications, and other resources on a computer. (WIN 264)
|
text password
|
|
A cookie generated from Web site advertisers, who might use them to track your Web use for marketing purposes. (WIN 255)
|
third-party cookie
|
|
Malware that hides inside another program, often one downloaded from the Web. (WIN 232)
|
Trojan horse
|
|
To verify that you have an account on a computer when you want to synchronize your accounts on your multiple computing devices. (WIN 264)
|
trust
|
|
A boot method that starts a computer faster and in a more secure way than previous methods. (WIN 271)
|
Unified Extensible Firmware Interface (UEFI)
|
|
A change to software that can prevent or repair problems, enhance the security of a computer, or improve a computer’s performance. (WIN 230)
|
update
|
|
A collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings. (WIN 262)
|
user account
|
|
A feature that displays warnings and asks for confirmation to help prevent unauthorized changes to your computer. (WIN 270)
|
User Account Control (UAC)
|
|
A program attached to a file that runs when you open the file and copies itself to infect a computer. (WIN 222)
|
virus
|
|
Characteristics of a known virus. (WIN 232)
|
virus definition
|
|
On a Web page, a transparent image that invisibly tracks Web site usage. (WIN 259)
|
Web beacon
|
|
An operating system tool that checks for updates to system software. (WIN 222)
|
Windows Update
|
|
Harmful computer code that spreads without your interaction. (WIN 232)
|
worm
|