Module 1.3 - Computer Management Flashcards

1
Q

Encryption

A

The ‘scrambling’ of text or data to a specified set of rules to ensure the privacy of data during communication, or for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware

A

Malicious software installed without users’ knowledge and designed to negatively affect the operation of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall

A

Hardware and/or software that monitors the traffic between a computer and the Internet, to safeguard against breaches in security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UPS

A

Uninterruptible Power Supply - is a large rechargeable battery. It maintains sufficient power to allow a server to keep running until it can shut down cleanly and safely. A UPS also smooths the power output coming from the mains to avoid power spikes which would likely damage a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAID

A

Redundant Array of Inexpensive/Independent Disks – the configuration of two or more hard drives to act as one large storage utility, designed to minimise the possibility of data loss - by storing the data across all of the Disks (Data Striping) and providing a redundant copy of the data (Mirroring).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GIGO

A

‘Garbage In, Garbage Out’; the quality of the output for any computer system is directly related to the quality of the input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing

A

The substitution of email or web site addresses with false addresses in order to make a email or web site appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

Collection of programs designed to use administrator rights to gain control of a computer for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

A computer virus is a malicious program that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incremental backup

A

Backup schedule whereby backups are made only of new files and flies that have changed since the last backup, allowing selective data recovery from an earlier date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

Attempts from people, generally employing e-mail with links, to direct users to fake websites, where they are tricked into releasing personal information (e.g. passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pharming

A

When a hacker attempts to redirect your web traffic to a fake Web site that looks legitimate. The fake Web site requests you to enter confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

A from of malware disguised as a useful program, but in reality designed to do harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

A form of malware that tries to monitor and track the way you use your computer to discover confidential information, and then relay this to a third party.

Keyloggers are an example of Spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Online backup

A

The backing up of data on a server on the internet (the cloud), with the advantages of data synchronisation, sharing and portability.

17
Q

Social Engineering

A

Any attempt to manipulate someone into installing malware or giving out sensitive or personal information.

18
Q

Software Bug

A

A logical programming error that can cause unexpected behaviour, incorrect output or invalid data processing.

19
Q

Data Validation

A

Checking for the correctness of data from a computer perspective, i.e. with reference to a defined set of criteria, or allowable values, which the computer program with either reject or accept.

20
Q

Disk Imaging

A

Creating a backup ‘image’ of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure.

21
Q

Biometric Security

A

Security based on measurement and identification of unique physical characteristics of a person. e.g. fingerprints.

22
Q

Defensive Programming

A

A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry.

23
Q

Data Verification

A

Checking for the accuracy of data from a human perspective.