CAT definitions Flashcards
SMART
Self-monitoring analysis and reporting technology
HSDPA
High speed downlink packet access
EIDE
Enhanced integrated drive electronics
Wimax
Worldwide interoperability for microwave access. Telecommunications technology which aims at providing wireless data over long distances in a variety of ways
CMYB
Cyan mageta yellow and black
Metadata
Additional data stored about a file that describes the content of the file
Ergonomics
Design of hardware taken into account the users safety and comfort
Plug n play
Plug and play refers to a technology thatallows devices to be automatically recognized by the computer when connected, without requiring manual intervention
Hot swapping
Hot-swappable devices are those that can be connected or disconnected from the computer while it is running (power on) without causing damage or requiring a system restart
Piggy backing
The use of a wireless connection to gain access to the internet without proper authority
Cache memory
High speed memory used for recently or frequently accessed data. Helps to retrieve data faster when you want to access it again
Firewire
faster transfer rate from one device to another
HSDPA - High speed downlink packet access
It is sometimes refered to as 3.5g or 3G+ rolled out in the 2000s and enhanced 3G
Anti-virus
software designed to detect and destroy malicious files
ANTI-SPYWARE
SOFTWARE DESIGNED TO DETECT AND DESTROY MALICIOUS PROGRAMS
SOFTWARE LICENCE
A DOCUMENT THAT PROVIDES LEGAL BINDING
GUIDELINES FOR THE USE AND DISTRIBUTION OF SOFTWARE
MULTI-USER LICENCE
A SOFTWARE LICENSE THAT ALLOWS MORE THAN ONE PERSON TO USE THE SOFTWARE
HOAX
A WARNING MESSAGE REGARDING A NON EXISITANT VIRUS THREAT.
INFORMATION THAT IS NOT TRUE SPREAD VIA
THE INTERNET WHICH MAY CAUSE FEAR AND INSTABILITY
HACKER
A HACKER IS JUST A PERSON WHO USES
COMPUTER PROGRAMMING OR TECHNICAL
SKILLS TO OVERCOME A CHALLENGE OR
PROBLEM. HACKERS INTENTIONALLY VIOLATE
COMPUTER SECURITY FOR A VARIETY OF REASONS
CRACKER
CRACKERS ARE MOTIVATED BY MALICIOUS INTENT
PHISHING
TYPE OF SOCIAL ENGINEERING ATTACK OFTEN
USED TO STEAL THE USERS DATA. SUCH AS LOG IN DETAILS / CARD NUMBERS
SOCIAL ENGINEERING
THE ACT OF MANIPULATING PEOPLE INTO GIVING OUT CONFIDENTIAL INFORMATION
TROJAN HORSE
SOFTWARE THAT CAN TAKE CONTROL OF
YOUR COMPUTER, THIS SOFTWARE MAY SEEM HELPFUL / LEGITIMATE BUT IN FACT IT CAUSES DAMAGE.
SURFING
MOVING FROM ONE WEBPAGE TO ANOTHER USUALLY IN AN UNIDRECTED MANNER
PHARMING
ONLINE SCAM SIMILAR TO PHISHING. A FAKE
WEBSITE IS CREATED WHICH SEEMS TO BE
LEGIT, ONCE CLICKED ON THE LINK WILL TAKE
YOU TO A FAKE SITE
WHALING
HIGHLY TARGETED PHISHING ATTACK.
MASQUERADING AS A LEGITIMATE EMAIL
SERVER FARM
IS A COLLECTION OF COMPUTER SERVERS MAINTAINED BY AN ORGANISATION
INTERNET OF THINGS
A TREND OF ALL SORTS OF DEVICES AND
EQUIPMENT THAT CONNECT TO THE INTERNET
SO THEY CAN BE MONITORED OR REMOTELY
CONTROLLED
BACKBONE
THE PART OF A COMPUTER NETWORK WHICH
INTERCONNECTS NETWORKS, PROVIDING A
PATH FOR THE EXCHANGE OF INFORMATION
BETWEEN DIFFERENT LANS OR SUBNETWORKS
BANDWIDTH
AMOUNT / AMOUNT OF DATA TRANSMITTED
OVER AN INTERNET CONNECTION AT A GIVEN TIME
SIPHONING
FRAUDULENT USE OF SPYWARE OR
CYBERSQUATTING TO STEAL THE TRAFFIC
BROADBAND
SPEED / TRANSMISSION OF WIDE BANDWIDTH
DATA OVER A HIGH SPEED INTERNET CONNECTION