Gr 11 1.3 COMPUTER MANAGEMENT – SAFE- GUARDING OUR DATA Flashcards

1
Q

Biometric security

A

Security based on measurement and identification of unique
physical characteristics of a person, e.g fingerprints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data validation

A

Checking for the correctness of data from a computer
perspective, i.e with reference to a defined set of criteria, or
allowable values, which the computer program will either
accept or reject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data verification

A

Checking for the accuracy of data from a human perspective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defensive programming

A

A technique whereby the programmer makes pro-active
provision for possible errors made by the user, in the
interest of correct data entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disk imaging

A

Creating a backup ‘image’ of the entire hard drive, including
all data and programs, to be used for re-installation in the
case of complete hard drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

The ‘scrambling’ of text or data according to a specified set
of rules to ensure the privacy of data during communication,
or for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

Hardware or software that monitors the traffic between a
computer and the internet, to safeguard against breaches in
security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GIGO

A

‘Garbage In, Garbage Out’ the quality of the output for any
computer system is directly related to the quality of the
input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incremental backup

A

Backup schedule whereby backups are made only on new
files and files that have changed since the last backup,
resulting in greater backup efficient (saving in disk space and
backup time), and allowing selective data recovery from an
earlier date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malware (malicious software) is a general term used to
describe malicious software that is specifically designed to
install itself without the user’s knowledge to negatively
affect or ‘harm’ a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Online backup

A

The backing up of data on a server on the Internet (‘the
cloud’), with the advantages of data synchronisation, sharing
and portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

Attempts from people, generally employing e-mail, to direct
other people to fake websites, where they are tricked into
releasing personal information (e.g passwords); then using
these details to commit identify theft and fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Raid

A

Redundant Array of Inexpensive/Independent Disks – the
configuration of two or more hard drives, designed to
minimise the possibility of data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rootkit

A

Collection of programs designed to use administrator rights
to gain and control of a computer for dangerous purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software bug

A

A logical programming error that can cause unexpected
program behaviour, incorrect output or invalid data
processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing

A

General term for conning techniques, such as phishing, used
to make electronic communication appear to originate from
another (legitimate) persons or institution.

17
Q

Spyware

A

A form of malware that tries to monitor and track the way
you use your computer to discover confidential information,
and then relay this to a third party.

18
Q

Trojan

A

A form of malware disguised as a useful program, but in
reality designed to do harm.

19
Q

UPS

A

Uninterruptible Power Supply – a hardware device used to
protect against power supply problems, consisting
essentially of a constantly charged battery between the
computer and the wall plug.

20
Q

Virus

A

A form of malware that attaches itself to a file or executable
program, thereby enabling it to spread between computers.

21
Q

Worm

A

Malware that is able to distribute itself over a network,
normally via e-mail, without a person having run an infected
program.