Computer Use & Security Flashcards

1
Q

Definition: a break in the system security that result in admittance of an unauthorized person or program to a department computer system.

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition: a system for sending and receiving messages electronically over a computer network accessed through a department owned computer.

A

Electronic Mail (E-Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Definition: a system (hardware or software) designed to prevent unauthorized access to or from a private network

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition: a physical computer system or any physical part of mechanism used as sn integral or peripheral component of a computer system

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition: uses internet-based technologies within an organization to facilitate communication and provide integrated access to information

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition: a worldwide network of computers linked together by various communication systems including local telephone service

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition: a system of computers, printers, and storage devices linked by direct connection, over data circuits, fiber optic lines, or via other electronic transmission methods that allows shared access to all resources on the network

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition: short for “malicious software” and refers to software programs designed to interfere with normal computer functions or sends personal data about the user to unauthorized parties over the internet

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition: A software application used to create, receive, transmit, store, and archive E-mail messages as well as store calendar, tasks, and contact information

A

Microsoft Outlook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition: the vendor contracted to provide records management, corrections management, automated filed reporting and computer aided dispatching software applications for the PD and FD

A

Tiburon (used to be)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition: The programming instructions the computer executes to perform tasks

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition: software freely obtained from public sources

A

Freeware Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition: software obtained through public sources with normally limited features periodic visual reminders to purchase, or a time limit cutoff

A

Shareware Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition: computer software whose source code is available under a license or agreement such as the public domain that permits users to use, change, and improve the software

A

Open Source Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition: software that is purchased from a retail outlet and installed to the user’s computer

A

Commercial Off the Shelf Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition: equipment or software that has not been provided by the department or is not properly licensed to the department

A

Unauthorized Equipment or Software

17
Q

Definition: a self-replicating computer program capable of attaching itself covertly to files

A

Virus

18
Q

Definition: a private communication network often used by companies or organizations to communicate confidentially over a public network

A

Virtual Private Network

19
Q

Definition: a computer program designed to covertly destroy or manipulate date, but cannot attach itself to other programs

A

Worm

20
Q

Which division is responsible for all things computer?

A

Information Technology Division

21
Q

True/False: You may copy any programs/information from the department computers.

A

False

22
Q

True/False: All information entered, generated, or retrieved from department computers is considered department property

A

True

23
Q

True/False: E-mail can be used for certain confidential conversations

A

False