IT Unit Flashcards
what is the difference between data and information
data represents a fact, information is data that has been organized
predicts that the number of transistors on a CPU will double every two years
moore’s law
the internet is
a large network of networks
tow or more computers connected using software and hardware so that they can communicate with each other
network
a computer language consisting of 0’s and 1’s
binary
RAM is this type of storage
volatile (temporary)
any device connected to a network such as a computer, printer or game console
node
in binary language, each letter or the alphabet, number and special symbol is made up of a unique combination of eight _______
bits
the amount of RAM storage is measured in ______
gigabytes
software than enables you to display and interact with text and other media on the web is a web ______
browser
the actual speed of data transfer that is received between two nodes on a network and is always less than or equal to the data transfer rate
throughput
smallest unit of measure
megabyte
uses electric memory and has no motor or moving parts
solid-state drive
some of the responsibilities of _____ are installing new hardware and software on the network and monitoring performance
network administrators
a keyboard and touch screen are the most common of ______ devices
input
not an example of cloud storage
flash drive
the unique identification number assigned to your computer when you connected to the internet in NOT known as a ______
path
a network architecture that spans the largest physical distance
WAN
the concept of the internet was developed by the U.S. Department of Defense as a network that ______ in the event of an attack
would not be disrupted easily
action perpetrated primarily through the use of a computer
cybercrime
individuals who use computers, networks, and the Internet to perpetrate crime
cybercriminal
common types of cybercrimes
FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud
break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses
white-hat hacker
break into systems to destroy information or for illegal gain
black-hat hacker
hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches
grey-hat hacker
program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet
packet analyzer
program that captures all keystrokes made on a computer
keylogger
program that appears to be something useful or desirable, but does something malicious in the background without your knowledge
trojan horse
programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge
rootkits
computer that a hacker controls
zombie