• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

The practice of tricking people into giving out private information, or allowing unsafe programs into the network computer

Social Engineering

A type of identity theft where the sender of an email message scams you into responding with personal data about yourself.

Phishing

A program that replicates by attaching itself to other programs. The program could be an application, a macro in a document, Windows SYS file or boot loader program

Virus

A virus that hides in the MBR program in the boot sector of a hard drive or in an OS boot loader program.

Boot sector virus

Produces all those unwanted pop-up emails.

Adware

Spies on you to collect personal information about you that it transmits over the internet to web-hosting sites.

Spyware

Tracks all your keystrokes and can be used to steal a person's identity, credit card numbers, Social Security number, bank information, passwords, email addresses, and so forth.

Keylogger

A program that copies itself throughout, a network or the internet without a host program. It creates problems by overloading the network as it replicates and can even hijack or install a server program.

Worm

Does not need a host program to work; rather it substitutes itself for a legitimate program. Often downloaded from a web site when a user is tricked into thinking it is legitimate software, or tricked into opening an email attachment.

Trojan

A virus that loads itself before the OS boot is complete. It can hide folders that contain software it has installed and can hijack internal Windows components so that it makes information Windows provides to user mode utilities such as Task Manager, Windows explorer, the registry editor, and antivirus software.

Rootkit

Gives you root or administrative privileges to the operating system and the entire file system, and complete access to all commands and features.

Jailbreaking

A comprehensive user interface that incorporates the older TouchFLO technology used by mobile devices.

HTC Sense

A multi-touch technology developed by High Tech Computer and widely used by mobile devices.

TouchFLO

A device that has no parts for in field repairs. It is not possible to upgrade or replace internal components without having to shop online for them.

Field-replaceable units (FRU)

A device that contains a disc that is free to move and can respond to gravity as the device is moved.

Gyroscope

Disables all three antennas, so a device can neither transmit nor receive signals.

Airplane Mode

When one physical machine hosts multiple activities that are normally done on multiple machines.

Virtualization

Using this virtualization, a server provides a virtual desktop or application for users on multiple client machines.

Sever-Side Virtualization

A presentation of a virtual desktop made to a client computer by a server that is serving up a virtual machine.

Virtual Desktop Infrastructure

Based on the computing power of the client; what are the three categories of clients used in server-side virtualization?

Fat Client


Thin Client


Zero Client

The main advantage of using this type of client is the personal computer can be used for other purposes than server-side virtualization.

Fat Clients

A computer that has an operating system, buy has little computing power and might only need to support a browser used to communicate with the server.

Thin Clients

Does not have an operating system and merely provides an interface between the user and the server. It contains little more than a keyboard, mouse, monitor, and network connection - used to further reduce the cost of a client machine.

Zero client

When server-side virtualization is delegated to a third-party service, and the internet is used to connnect server and client machines.

Cloud computing

A cloud- computing service that provides only the hardware, which can include servers, Network attached storage devices, and networks.

Infrastructure as a Service (IaaS)

A cloud computing service that provides the hardware and the operating system and is responsible for updating and maintaining both.

Platform as a Service (PaaS)

A cloud computing service where the service is responsible for the hardware, the operating systems, and the applications installed.

Software as a Service (SaaS)

Using this virtualization, a virtual environment is created in memory for an application to virtually install itself.

Application virtualization

Using this virtualization, software installed on a desktop or laptop manages virtual machines used by the local user.

Client-side desktop virtualization

Motherboard BIOS and processor support used by hypervisor software when it creates and runs virtual machines on a computer. The feature must be enabled in BIOS setup.

Hardware-assisted virtualization (HAV)