Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
The practice of tricking people into giving out private information, or allowing unsafe programs into the network computer |
Social Engineering |
|
A type of identity theft where the sender of an email message scams you into responding with personal data about yourself. |
Phishing |
|
A program that replicates by attaching itself to other programs. The program could be an application, a macro in a document, Windows SYS file or boot loader program |
Virus |
|
A virus that hides in the MBR program in the boot sector of a hard drive or in an OS boot loader program. |
Boot sector virus |
|
Produces all those unwanted pop-up emails. |
Adware |
|
Spies on you to collect personal information about you that it transmits over the internet to web-hosting sites. |
Spyware |
|
Tracks all your keystrokes and can be used to steal a person's identity, credit card numbers, Social Security number, bank information, passwords, email addresses, and so forth. |
Keylogger |
|
A program that copies itself throughout, a network or the internet without a host program. It creates problems by overloading the network as it replicates and can even hijack or install a server program. |
Worm |
|
Does not need a host program to work; rather it substitutes itself for a legitimate program. Often downloaded from a web site when a user is tricked into thinking it is legitimate software, or tricked into opening an email attachment. |
Trojan |
|
A virus that loads itself before the OS boot is complete. It can hide folders that contain software it has installed and can hijack internal Windows components so that it makes information Windows provides to user mode utilities such as Task Manager, Windows explorer, the registry editor, and antivirus software. |
Rootkit |
|
Gives you root or administrative privileges to the operating system and the entire file system, and complete access to all commands and features. |
Jailbreaking |
|
A comprehensive user interface that incorporates the older TouchFLO technology used by mobile devices. |
HTC Sense |
|
A multi-touch technology developed by High Tech Computer and widely used by mobile devices. |
TouchFLO |
|
A device that has no parts for in field repairs. It is not possible to upgrade or replace internal components without having to shop online for them. |
Field-replaceable units (FRU) |
|
A device that contains a disc that is free to move and can respond to gravity as the device is moved. |
Gyroscope |
|
Disables all three antennas, so a device can neither transmit nor receive signals. |
Airplane Mode |
|
When one physical machine hosts multiple activities that are normally done on multiple machines. |
Virtualization |
|
Using this virtualization, a server provides a virtual desktop or application for users on multiple client machines. |
Sever-Side Virtualization |
|
A presentation of a virtual desktop made to a client computer by a server that is serving up a virtual machine. |
Virtual Desktop Infrastructure |
|
Based on the computing power of the client; what are the three categories of clients used in server-side virtualization? |
Fat Client Thin Client Zero Client |
|
The main advantage of using this type of client is the personal computer can be used for other purposes than server-side virtualization. |
Fat Clients |
|
A computer that has an operating system, buy has little computing power and might only need to support a browser used to communicate with the server. |
Thin Clients |
|
Does not have an operating system and merely provides an interface between the user and the server. It contains little more than a keyboard, mouse, monitor, and network connection - used to further reduce the cost of a client machine. |
Zero client |
|
When server-side virtualization is delegated to a third-party service, and the internet is used to connnect server and client machines. |
Cloud computing |
|
A cloud- computing service that provides only the hardware, which can include servers, Network attached storage devices, and networks. |
Infrastructure as a Service (IaaS) |
|
A cloud computing service that provides the hardware and the operating system and is responsible for updating and maintaining both. |
Platform as a Service (PaaS) |
|
A cloud computing service where the service is responsible for the hardware, the operating systems, and the applications installed. |
Software as a Service (SaaS) |
|
Using this virtualization, a virtual environment is created in memory for an application to virtually install itself. |
Application virtualization |
|
Using this virtualization, software installed on a desktop or laptop manages virtual machines used by the local user. |
Client-side desktop virtualization |
|
Motherboard BIOS and processor support used by hypervisor software when it creates and runs virtual machines on a computer. The feature must be enabled in BIOS setup. |
Hardware-assisted virtualization (HAV) |