1.3- Computer Management Flashcards

1
Q

Biometric security

A

Security based on measurement and ID of unique physical characteristics of person, eg fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data validation

A

Checking for the correctness of data from a computer perspective, ie with reference to a defined set of criteria or allowable values, which the computer program will either accept or reject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data verification

A

Checking for accuracy of data from human perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defensive programming

A

A technique whereby programmer makes pro-active provision for possible errors made by user, in interest of correct data entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disk imaging

A

Creating a backup ‘image’ of entire hard drive, including all data and programs, to be used for re-installation in case of complete hard drive failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

The ‘scrambling’ of text or data according to a specified set of rules to ensure privacy of data during communication, or for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

Hardware or software that monitors traffic between computer and Internet, to safeguard against breaches in security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GIGO

A

‘Garbage In, Garbage Out’: quality of output for any computer system is directly related to quality of input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incremental backup

A

Backup schedule whereby backups are made only of new files and files that have been changed since the last backup, resulting in greater backup efficiency (saving disk space and time), and allowing selective data recovery from an earlier date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malicious Software: general term used to describe malicious software specifically designed to install itself without user’s knowledge to negatively affect or ‘harm’ a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Online backup

A

The backing up of data on a server on the Internet (‘the cloud’), with the advantages of data synchronisation, sharing and portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

Attempts from people, generally employing e-mail, to direct other people to fake websites, where they are tricked into releasing personal information (eg passwords); then using these details to commit identity theft and fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAID

A

Redundant Array of Independent Disks: the configuration of 2 or more hard drives, designed to minimise possibility of data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

Collection of programs designed to use admin rights to gain control of computer for dangerous purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

Any attempt to manipulate or ‘con’ someone into installing malware or giving out sensitive or personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software bug

A

Logical programming error. Can cause unexpected program behaviour, incorrect output or invalid data processing

17
Q

Spoofing

A

General term for conning techniques (such as phishing) used to make e-communication appear to originate from another (legitimate) person or institution

18
Q

Spyware

A

Form of malware that tries to monitor and track the way you use your computer to discover confidential info and relay it to a third party

19
Q

Trojan

A

Form of malware disguised as useful program, but in reality designed to do harm

20
Q

UPS

A

Uninterruptible Power Supply: hardware device used to protect against supply problems, consisting essentially of constantly charged battery between computer and wall plug

21
Q

Virus

A

Form of malware that attaches itself to a file or executable program, thereby enabling it to spread between computers

22
Q

Worm

A

Malware able to distribute itself over network, normally via e-mail, without person having run infected program