CS101 midterms Flashcards
consists of programs designed to make users more productive and/or assist with personal tasks
Application Software:
4 Categories of application software:
> Business
Graphics and Multimedia
Home / Personal / Educational
Communications
Public-domain software is _________ available to the public for a fee.
NOT
serves as the interface between the user, the application software, and the computer’s hardware
System software
type of system software that assists users with controlling or maintaining the operation of a computer its devices or its software.
Utility Programs-
- type of malicious software
Computer virus
is application that assists people while performing business activities
Business software:
allows user to create and manipulate documents
Word processing software (word processor) -
is a collection of electronic drawings, photo and other images.
Clip art -
allows users to organize data in rows and columns and perform calculations
Spreadsheet software -
depicts data in a spreadsheets in graphical form
Charting -
is a collection of data organized in a manner that allows access, retrieval, and use of that data
Database
- allows users to crate visual aids for presentation to communicate ideas, messages and other information to a group
Presentation software
is application software that enables users to enter typed text, hand written comments, drawings, or sketches anywhere on a page
Note taking software
Collection of individual programs available together as a unit
Software suite -
is application software that includes appointment calendar, address book and notepad
Personal information manager (PIM) -
allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project
Project management software
helps companies record and report their financial transactions
Accounting software
provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user
Document management software
typically require special computing solutions for various functional units
Enterprise
help users of all skill levels create web pages that include multimedia and interactive content.
Web page authoring software
is a website that allows users to access and interact with software from any computer or device that is connected to the internet.
Web application (web app)
is a electronic equivalent of a user manual
Online Help -
provides updates and more comprehensive resources to respond to technical issues about software
Web-based help -
is a type of cbt(computer based training) that uses internet technology and consists of application software on the web
Web-based training -
is the delivery of education at one location while the learning takes place at other locations
Distance learning (DL) -
Consists of the programs that control or maintain the operations of the computer and its devices.
System software -
is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system (os) (platform) -
the process of staring and restarting a computer
Booting (cold boot)-
- using the OS to restart the software
warm Boot
- is the core of an operating system that manages memory and devices,
Kernel
- saves open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low power state
Sleep mode
saves any open documents and programs to a hard disk before removing power from the computer
Hibernates
control show you enter data and instructions and how information is displayed on the screen
User interface -
- you interact with menus and visual images
graphic user interface (GUI)
a user uses the keyboard to enter data and instructions
Command-line interface,
- enables two or more users to run programs simultaneously.
A multiuser operating system
supports two or more processors running programs at the
Multiprocessing operating system
optimizes the use of RAM
Memory management
is a portion of storage medium functioning as additional RAM
Virtual memory
can allocate up to 4 gb of removable flash memory devices as additional memory cache
Window ready Boost
- is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
Buffer
- is the process of sending documents to be printed to a buffer instead of sending them immediately to the printer.
Spooling
small program that tells the operating system how to communicate with a specific device
Driver -
automatically configures new devices as you install them
Plug and play
automatically provides updates to the program
Automatic update
- organizes and coordinates how multiple users access and share resources on a network.
Server operating system
uses the server operating system to:
> add and remove users, computers and other devices
> Install software and administer network security
Network administrator
- identifies a specific user
Username or User ID
- is a private combination of characters associated with the user name
A Password
- is a complete operating system that works on a desktop computer, notebook computer, and some tablets
Stand-alone operating system
is a multitasking operating system developed in the early 1970s
Unix
is a open source popular, multitasking unix-type operating system
Linux
is a linux based operating system designed to work primarily with web apps
Chrome Os
The operating system on mobile devices and many consumers electronics called a __________ and reside on firmware
mobile operating system
is a open source, linux based mobile operating system designed by google for smartphones and tablets
Android
, developed by Apple, is a proprietary mobile operating system specifically made for Apple’s mobile devices
iOS
, which means they Recognize and work with applications written for an earlier version of the operating system
Backward compatible
meaning it may or may not run on new versions of the operating system.
upward compatible,
is a type of system software that allows a user to perform maintenance type tasks
utility program
is a utility that performs functions related to file management
File manager
is a program that attempts to locate a file on your computer based criteria you specify
Search utility
removes a program as well as any associated entries in the system files
Uninstaller
allows user to display, copy, and print the content of graphics file
Image viewer
utility searches for and removes unnecessary files
Disk cleanup
reorganizes the files nad unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster
Disk defragmenter
allows users to copy files to another medium
Backup utility
reverses the process and returns backed up files to their original form
Restore utility
is a specific named location on a storage medium that contains related documents.
folder
is the process of reorganizing the disk so that the files are stored in contiguous sectors
Defragmenting
copies Itself repeatedly in memory or over a network
worm
describes a potentially damaging computer program that affects a computer negatively
virus
hides within or looks like a Legitimate Program
Trojan horse
protects a Computer against viruses
antivirus program
is a program placed on a computer without the user’s knowledge that secretly collects information about the user
Spyware
detects and deletes spyware and other similar programs
spyware remover
displays an online advertisement in a banner or pop-up window
Adware
is a program that detects and deletes adware
adware remover
are programs that remove or block certain items from being displayed
Filters
shrinks the size of a file(s)
file compression utility
frees up room on the storage media
Compressing files
Compressed files sometimes are called
zipped files
is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
Spam
is a scam in which a perpetrator attempts to obtain your personal and/or financial information
Phishing
s an Internet advertisement that suddenly appears in a new window in the foreground of a Web page displayed in your browser.
Pop-up ad
writes text, graphics, audio, and video files on a recordable or rewritable optical disks
Disk burning software
identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance
Personal computer maintenance utility
- mass produced, copyright retail software that meets the needs of a wide variety of users, not just a single user or company available on the web
Packaged software
- Performs functions specific to business or industry
Custom software
- website that allows users to access and interact with software from any computer or devices that is connected to the internet
Web application
- is a software provided for use specification and distribution this software has (no restrictions) from the copyright holder regarding modification of the software’s internal instructions and redistribution
Open source software
- copyrighted software that is distributed at no cost for a trial period
Shareware
- copyrighted software that provided at no cost to a user by an individual or company that retains all rights to the software
Freeware
- software has been donated for public use and has no copyright restrictions, anyone can copy and distribute public domain software
Public Domain software
- assists the user with controlling or maintaining the operation of a computer its devices or its software utility
Utility program
- users can easily change what they have written, many features to make its professional and visually appealing
Advantage of Word processing software
- shows trend during period of time
Line chart
- displays a bar of various length to show the relationship of data
Column chart
relationships of part to a whole
Pie Chart -
3 popular chart types
Line chart
Column chart -
Pie Chart -
- software is a sophisticated type of application software that assists a professional user in creating engineering, architectural and scientific designs
Computer-aided design (CAD)
- enables professional designers to create sophisticated documents that contain text graphics and many colors
Desktop Publishing software (DTP software)
to create and modify graphical images
Paint / Image editing software -
type of image edtiitng software that allows photographers, engineers and scientists to edit and customize digital photos
Professional Photo editing software -
Allows professionals to modify a segment of video called a clip it also includes audio editing
Video and audio editing software -
Allows users to modify texts, graphics, audio, video and animation in an interactive application
Multimedia authoring software -
simplified accounting programs, helps balance their checkbooks, pay bills, track personal income and expenses
Personal Finance software -
assist in the preparation of legal documents and provides legal information
Legal software -
can guide individual through the process of filing taxes
Tax preparation software -
create newsletters, brochures, flyers, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages
Personal DTP software -
includes various simplified tools that allows you to draw pictures shapes and other images
Personal paint / image editing software -
allows user to edit digital photos
Personal photo editing software -
collection of clip art and photo
Clip art / image gallery -
for small scale movie making projects
Video and audio editing software -
- assist with design remodeling or improvement of a home deck
Home design / Landscaping software
determine routes directions and local points of interest
Travel and mapping software -
provides valuable and thorough information for all individuals
Reference software -
teaches a particular skill
Educational software -
Designed to support a hobby or provide enjoyment
Entertainment software -
- often store users data and information on their servers
Web application hosts
delivery of education via some electronic method such as the internet
E-learning (electronic learning) -
-Time-stamped articles, or posts, in a diary or journal format usually listed in reverse chronological order.
Blogging
Web browser - It allows users to access and view Web pages on the Internet.
Web browser
- A named collection of stored data, instructions, or information
File
allows users to interact with the operating system by executing commands and launching applications.
shell in an operating system
Protection from hostile forces that intends to compromise the normal state of being of something
security
What does CIA Mean?
C: Confidentiality of data
I: Integrity of data
A: Availability of data
is the state of being safe from malicious actors
Security
is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
Risk
An intentional breach of digital security often involves a deliberate act that is against the law
Cybercrime
: A formal and umbrella term for anyone who maliciously acts upon a computer system
Threat Actors
: are individuals who want to attack computers but lack the knowledge of computers and networks needed to do so. Usually downloads pre-made hacking tools coded by other hackers.
Script Kiddies
A threat actor that breaks through a computer security without required permission
Hacker:
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
Cracker:
: See Discussion / Activity on Module 1 about hacktivists
Hacktivists
Attack a nation’s national computer systems, mostly power grids and tech infrastructure that compromises national security, to instill fear and insecurity
Cyberterrorists:
threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network - if they are not paid a sum of money
Cyberextortionist:
Types of Cybercriminals
Threat Actors
Script Kiddies
Hacker:
Cracker
Hacktivists:
Cyberterrorists:
Cyberextortionist:
is a common way to trick people to entering their passwords and other info to websites controlled by threat actors.
Phishing
An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes
RA 10175 - Anti-Cybercrime Act of 2012
is the discovery, collection, and analysis of evidence found on computers and networks
involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks
Digital Forensics
A contraction of the words “malicious” and “software”
A general term for software that are intended to disrupt computer security
Malware
is a group of compromised computers or mobile devices connected to a network,
Botnets
a type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services
Denial of Service (DoS)
What is DOS called when the botnet executed it?
Distributed DoS (DDoS)
Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Backdoor
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Spoofing
is a category of attacks that attempts to trick the victim into giving valuable information to the attacker relies on an attacker’s clever manipulation of human nature in order to persuade the victim to provide information or take actions
Social Engineering
Detects and automatically takes action against malicious code that attempts to run through a computer
Antivirus
Protects network resources from outsiders and to restrict employees’ access to sensitive data
Firewall
a private, secure path across a public network that allows authorized users secure access to a company or other network
Virtual Private Networks (VPN)
Prevent other users from accessing your computer by implementing access controls
Proper Access Controls
If your data is backed up, threats of a cyberextortionist / cracker deleting the data won’t be a huge deal
Data Backups
Usually, in public places, threat actors creates a WiFi access point of the same name as the one existing in public
Avoid Evil Twins
is a period of time during which an individual refrains from using technolog
Digital Detox
more time it would take to brute-force it, therefore increased security
Should always have
Strong passwords =
give a One-Time Password (OTP) you would provide on top of your additional password
Two-Factor Authentication
Would require a part of your body to be scanned
Biometrics
Requires a user to answer a prompt to prove the user’s humanity
Captcha
A stolen encrypted data is just as worthless as 983j984hd027897634hwtyewisjo8we if a threat actor cannot decipher what it means
Encryptions
An operating system resides on a ROM chip on a mobile device or consumer electronic device
Embedded/Mobile OS