Commtech 4 Flashcards
Codec
Compression/decompression
Mpeg
Moving picture expert group
Name of a family of standards for coding video and audio information in a digital compressed format
I-picture
Intra-coded picture
Single compressed picture that contains all the spatial information of a video picture
Encoded as free standing image (no B-pic or P-pic reference)
P-picture
Predictive
Computed based on nearest previous I- or P-pic
More compressed than I- pictures and provide a reference for the calculations
B-pictures
Bi-directional pictures
Use both past and subsequent pictures as references to calculate the compressed picture data
DTCP
Digital transmission content protection
ACP
Analog copying & piracy
Prevents or distorts copies made over an analog connection
CA
Conditional access
The protection of content by requiring certain criteria to be met before granting access to this content
HTIB
Home theater in a box
Direct view tv
CRT
Least expensive
Highest quality picture
Size limitations
Rear projection tv
CRT,DLP, LCD,LCos
Larger screen size
Lower profile
Affordable
Front projection tv
CRT, DLP, LCFD, LCos
Largest size
Needs highly reflective screen
Flat panel
LCD, Plasma
Larger size screen
Lowest profile
Four actions performed by a virus
R,Ew,C,D
Replication, event watching, camouflage, delivery
Main types of viruses
E,Em,W,Th
Executable, email, worms, Trojan horses
Replication
Inserts copies of itself into other program files
Replicates itself
Event watching
Checks for conditions (usually a specific date)
When conditions exist, virus delivers its destructive payload.
Camouflage
Disguise themselves to avoid antivirus detection
May falsify information in header so program file appears to be the correct size
Delivery
When triggering condition is met
, virus unleashes payload
May be harmless or destructive
Executable virus
Software that piggybacks on rep programs
When program runs, the virus runs too
E-mail virus
Contained in an email or its attachments or both
Usually replicates itself by mailing itself to dozens of people in victims email address book
Worms
Software: uses computer networks and security holes to replicate itself
A copy of the worm scans the network for another machine that has a specific security hole.
Trojan horses
Small program
Claims to be something it’s not (like a game) but when it runs it does damage (sending e,ails, erasing files)
Spyware
A program that sends information about you and how you use your PC to makers and advertisers, usually without you being aware