cpu basics quiz 1 Flashcards
What are applications?
Individual programs/storage places that exist within the operating system
Examples include word processors, spreadsheets, and games.
What is a graphical user interface (GUI)?
You don’t have to type or enter commands to make it work
GUIs allow users to interact with electronic devices using graphical icons.
What is the command line?
Typing in code for output
It requires users to enter text commands to perform tasks.
What is cloud computing?
The ability to access software and file storage on remote computers
It enables on-demand availability of computer resources.
What is the purpose of US Copyright law, Title 17?
Provides exclusive rights to the person who creates a document, film, etc.
This includes the right to reproduce, distribute, and display the work.
Is the copyright symbol required for something to be copyrighted?
No
Copyright protection is automatic upon the creation of the work.
What is ‘soft lifting’?
When people download things for their own use in violation of copyright
It often involves sharing software without proper licensing.
degree of crime of software piracy
felony
It refers to the illegal copying, distribution, or use of software.
types of ownership with copyright
proprietary
shareware
freeware (free)
open source (free)
content without copyright
public domain (free)
RAM
random access memory
- stores short term information like copy and paste
social engineering
user is tricked into downloading malware onto their device
drive-by-downloading
web page or ad automatically downloads
phishing
user has to click on a link (more common)
pharming
end up going to the wrong URL (not as common anymore d/t bookmarks)
ransomware
hacker download malware that locks out access to files and requires payment to unlock it
botnet
networks of infected computers that infect others
worm
small malware program; does not require social engineering; exploits already existing weaknesses
trojan horse
acts like a good program/app but has hidden purposes; app that collects data and sends elsewhere
adware/spyware
obtains information about the users computer activities by transmitting data covertly from the hard drive