Chapter 5 Vocab Flashcards

1
Q

A setting that disables or turns off all network adapters on a device.

A

Airplane mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of security software used to prevent and remove adware and spyware infections.

A

Antispyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A form of security software that protects against viruses, Trojan horses, worms, and spyware.

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The file system found on Macs running macOS.

A

APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Making copies of important files.

A

Backing up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A program that makes copies of important files.

A

Backup utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An anonymous, digital, encrypted currency.

A

Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer that is infected with malware and is part of a botnet under the control of a master. Also called a zombie.

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network of computer zombies, or bots, controlled by a master, which can be used to send out spam and viruses or to launch a denial-of-service attack.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A form of spyware that changes your home page and redirects you to other websites.

A

Browser hijacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A flaw in software programming.

A

Bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One or more sectors on a disk where data is stored.

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A program that replicates itself and infects computers. It needs a host file on which to travel.

A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer that is infected with malware and is part of a botnet under the control of a master. Also called a bot.

A

Computer zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A small text file placed on a computer when you visit a website that helps the website identify you when you return.

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack that sends out so much traffic that it could cripple a server or network.

A

Denial-of-service attack (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A program that monitors the health of the file system on a disk.

A

Disk-checking utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program that looks for files that can be safely deleted to free up disk space enabling you to have more space to store your files and to help keep your system running efficiently.

A

Disk cleanup utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A utility that rearranges the fragmented files on a disk.

A

Disk defragmenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process that prepares a disk to hold files and consists of two steps: low-level formatting and high-level formatting.

A

Disk formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The process of creating a mirror image of an entire hard disk.

A

Drive imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A situation that occurs when you visit a website that installs a program in the background without your knowledge.

A

Drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A rating system that recognizes devices that use an average of 20 percent to 30 percent less energy than comparable devices.

A

Energy Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The file system used on some external disks or those running older versions of Windows.

A

FAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Unorganized files that are broken into small pieces and stored in nonadjacent, or noncontiguous, clusters on the disk.

A

File fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Windows utility that creates copies of your files on an external or network drive.

A

File History

27
Q

A system that keeps track of what files are saved and where they are stored on the disk.

A

File system

28
Q

Feature found in macOS applications that download files from the internet (Safari, Messages, iChat, and Mail), checks for known malware when you try to open a downloaded file.

A

File quarantine

29
Q

A device or software that blocks unauthorized access to a network or an individual computer.

A

Firewall

30
Q

The Mac OS X file system.

A

HFS+

31
Q

A software update that addresses an individual problem when it is discovered. Also called a patch.

A

Hotfix

32
Q

A backup that includes only those files that have changed.

A

Incremental backup

33
Q

Unsolicited and unwanted email messages, also called spam.

A

Junk email

34
Q

A feature of computers and mobile devices that determines your location by using GPS or wireless networks.

A

Location services

35
Q

An attack by malware that occurs when certain conditions are met.

A

Logic bomb

36
Q

Malicious software; a program that is designed to be harmful or malicious.

A

Malware

37
Q

Information that, if lost, will result in the failure of business operations.

A

Mission-critical information

38
Q

The file system used on hard disks in Windows.

A

NTFS

39
Q

A software update that addresses an individual problem when it is discovered. Also called a hotfix.

A

Patch

40
Q

An action or attack by a computer virus or other malware.

A

Payload

41
Q

Using an open wireless network to access the Internet without permission.

A

Piggybacking

42
Q

A network that uses internet technologies to provide resources and services accessible to an internal organization.

A

Private cloud

43
Q

A network of shared resources and services available to the public over the internet.

A

Public cloud

44
Q

A form of malware that prevents you from using your computer until you pay a fine or fee.

A

Ransomware

45
Q

A set of programs that enables someone to gain control over a computer system while hiding the fact that the computer has been compromised.

A

Rootkit

46
Q

A special diagnostic mode for troubleshooting the system that loads Windows without most device drivers.

A

Safe Mode

47
Q

A wedge-shaped section of a disk where data is stored.

A

Sector

48
Q

A package of security software that includes a combination of features such as antivirus, firewall, and privacy protection.

A

Security suite

49
Q

A large, planned software update that addresses multiple problems, or adds multiple features, and includes previous patches and hotfixes.

A

Service pack

50
Q

Unsolicited and unwanted email messages, also called junk mail.

A

Spam

51
Q

The sending of mass, unsolicited emails.

A

Spamming

52
Q

A form of malware that secretly gathers personal information about you.

A

Spyware

53
Q

The minimum hardware and software specifications required to run a software application.

A

System requirements

54
Q

A Windows tool that enables you to return the system to a previous state saved as a restore point.

A

System restore

55
Q

A troubleshooting tool that enables you to view and stop processes that are running on a Windows computer.

A

Task Manager

56
Q

A logic bomb that is triggered by a specific date or time.

A

Time bomb

57
Q

The backup utility in macOS.

A

Time Machine

58
Q

A concentric circle created on a disk during low-level disk formatting.

A

Track

59
Q

A program that appears to be a legitimate program but that is actually malicious.

A

Trojan horse

60
Q

An email message that does not contain a virus but that tricks you into behavior that can be harmful, such as searching for and deleting files that the computer actually needs.

A

Virus hoax

61
Q

Driving around and locating open wireless access points.

A

Wardriving

62
Q

A Windows utility that protects against viruses and other malware.

A

Windows Defender

63
Q

A form of self-replicating malware that does not need a host to travel. It travels over networks and spreads over the network connections without any human intervention.

A

Worm