• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
What is a digital certificate?
A password protected, encrypted data file containing message encryption, user and identification and message text.
What is a bomb virus?
Resides on the hard disk and is activated when a particular event occurs, such as a date change, a fle change or a user or program action.
Stealth virus
Resides in the computer's memory and conceals changes it makes to files, hiding the damage from the user and the operatiing system.
File infecting virus
Infects program files on a disk. When the infected program is run, the virus also runs.
What is malware?
Software designed to harm computer system.
What is netiquette?
The guidlines that encourages common sense and politeness, and establishes general rules for Internet etiquette.
What browser features allows you to save Web site addresses for quick relocation?
Bookmarks and favorites
What type of browser is Lynx?
A text-only browser
You may not be able to view frames pages if your browser's copyright predates what year?
1996
Both Netscape Navigator and Microsoft Internet Explorer allow you to customize:
font-size
What is a key?
A variable value that uses an algorithm to encrypt and decrypt data.
What is a Hash?
A number generated by an algorithm from a string of text.
What is the hardest virus to detect?
Polymorphic
What protocol is used for sending e-mail?
SMTP or MIME
What protocol is used for receiving e-mail?
POP3
SMTP uses what port?
25
FTP uses what two ports?
20 and 21
What part of an e-mail address comes after the @ symbol?
Domain Name
What part of the OSI reference model is responsible for 0's/1's?
Physical Layer
What part of the OSI reference model is responsible for creating packets?
Network
What part of the OSI reference model is responsible for encryption/decryption?
Presentation
What part of the OSI reference model is responsible for E-mail?
Application
What part of the OSI reference model is responsible for dialog?
Session
What does the subnet mask control?
How many IP addresses you can have in a room
What is the loopback address?
127.0.0.1
What two servers a usually put together on one device?
file and print
What does a server do?
A computer in a network that manages the network resources and provides, or serves, information to clients.
What is a LAN (local area network?
A group of computers connected within a confined geographic area.
What is a database?
A collection of data that can be sorted and searched using search algorithms.
What is a table?
A collection of data about a limted topic, organized into rows and columns in a database.