ch6 Flashcards

1
Q

data privacy

A

privacy of personal information that cannot be seen or accessed by an unauthorised party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data security

A

a method taken to prevent unauthorised access of data or to recover data that is lost or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

firewall

A

software or hardware that sits between a computer and an external network that monitors all incoming and outgoing activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tasks carried out by a firewall

A

1- examining the traffic between a computer and an external network
2- checks if incoming or outgoing data meets a certain criteria
3- prevents access to certain unwanted sites
4-helps preventing viruses and hackers from entering the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

encryption

A

the use of encryption keys to make data meaningless without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

phishing

A

legitimate-looking email that tricks the user into giving their personal data to the sender of the email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

pharming

A

redirecting the user to a fake website in order to illegally obtain personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data integrity

A

the accuracy, completeness and consistency of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication techniques

A

1- digital signature
2- firewall
3-anti-virus software
4- anti-spyware software
5- encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how digital signature is used to authenticate a digital document during transmission over a network

A

the sender hashes the document to produce a digest the sender encrypts the digest, the receiver decrypts the digest If both of the receiver’s digests are the same the document is authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus

A

scans the computer for viruses and checks against
a stored database of viruses, that needs to be
updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
viruses and prevents the download continuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antispyware

A

scans the computer for spyware and checks
against a stored database of viruses, that needs to
be updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
spyware and prevents the download continuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Antimalware

A

scans the computer for viruses and checks against
a stored database of viruses, that needs to be
updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
viruses and prevents the download continuing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how the CU, system clock and control bus operate to transfer data between the
components of the computer system

A

1-The system clock gives out timing signals
2- … which are sent on the control bus
3- …to synchronise the other system components
4- The Control Unit initiates data transfer
5-…by generating signals that are sent on the control bus to other
components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

freeware

A

software that can be downloaded free of charge; however, it is covered by the usual copyright laws and cannot be modified; nor can the code be used for another purpose (no source code is available)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

shareware

A

software that is free of charge initially (free trial period). The full version of the software can
only be downloaded once the full fee for the software
has been paid.

17
Q

commercial software

A

Commercial software is available to customers for a fee, software is fully copyright-protected and
none of the code can be used without the prior consent of the copyright owner.

18
Q

use of open source software

A

to allow users to customise the code and to allow errors to be reported and to allow additional features to be added to the code