Packet. Flashcards

1
Q

What is windows?

A

The computer operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Peripherals

A

Any external device to provide input or output for the computer. Output is what comes out of the CPU the input is what goes in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false, the monitor is input

A

Falls of the monitor is output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false the keyboard is input

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the tab key do?

A

Move the cursor 1/2 inch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define malware

A

Malicious software used by hackers.

Example: viruses, Trojans, worms, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Trojan

A

A piece of software that tries to get access to your computer by pretending to be an innocent looking program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define virus

A

A code written with the intent of replicating itself. Attempts to spread using a host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a virus in the computer spread?

A

Websites, software, downloads etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do I protect my computer from a virus

A

Enable a fire wall, antivirus software, or windows update/software update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define address

A

A series of letters and numbers that identify a location. On the Internet typing in an address lets you send or receive information from specific sources. You can type in the address for an email account, website, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attachment

A

If I don’t that can be added to an email, like a document, photograph, or song.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bandwidth

A

An indication of how quickly data travels along a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber tip line

A

The Congressionally-mandated sight is operated by the National Center for Missing and Exploited Children. It is a means of reporting crimes against children.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false, The greater the band with the faster data will be sent and received

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the standard method computers use to communicate via the World Wide Web?

A

Hypertext transfer protocol or HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bookmark

A

A way to quickly access a favorite website by saving it in your browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

are the strings of letters and numbers that have to be typed in on some webpages before something can be saved.

The ones that no one can understand, the weird ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the acronym CAPTCHA stand for

A

Completely Automated Public Turing test to tell Computers and humans Apart.

It is supposed to sound like the word capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define chat room

A

An interactive forum where you can talk in real-time. It is a place or location online were a chat is taking place. Many chat rooms are made to discuss a common interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is responsible for everything you see on the screen? More importantly, many of these accelerate video decoding, meaning they help online videos from sites like Hulu and YouTube to look better and run more smoothly, among other functions.

A

The GPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud storage

A

A backup and storage service on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is any program that allows many different users to share files, such as movie, music, and image files, directly with each other? and are also apps for this.

A

File sharing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does cloud storage usually do?

A

It usually lets users upload any size and type of computer file, where as email attachments often have imitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is cloud storage also called?

A

Online storage and public cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is an Image or a portion of text that, when clicked, allows electronic connections?These connections can access other Internet materials such as images, sound, animations, videos, or other webpages

A

Hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Browser

A

A program that allows users to view webpages.

Mozilla Firefox, Google Chrome, and Microsoft Internet Explorer are examples of popular browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cyberbullying

A

Pulling through Internet application the technology such as instant message, social media, and cell phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Download

A

Information retrieved from the Internet, discs or CDs, and other computers which you can use or save to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a service that allows people to send messages with pictures and sound from the computer to any other computer in the world?

A

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is geolocation?

A

The identification of the real world geographic location of an object such as a radar mobile phone or Internet connected computer terminal

34
Q

What is the difference between cache and cookies?

A

Although cookies and cachets are two ways to store data on a client machine they serve different purposes. Cookies store information to track different characteristics related to a user, while caches make loading of web pages faster.

35
Q

What is a Filtering software?

A

Software that allows the screening of unwanted Internet content or blocks a specific function.

36
Q

What is a private network inside a company or organization called?

A

Intranet

37
Q

What is a system that creates a wall to keep out unwanted information, like spam and viruses, and unwanted people like hackers?

A

A firewall

38
Q

What is a popular term for someone who accesses computer information either legally or illegally?

A

Hacker

39
Q

What is it called when you send a deliberately confrontational message to others on the Internet?

A

Flaming

40
Q

What is the webpage that your browser is set to open to when it starts up, and is also called the main page of any website?

A

The homepage.

41
Q

Blog

A

A weblog, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on News and popular culture

42
Q

Cache

A

Pronounced cash; is a big but fast memory that transparently improve the performance of a larger but slower memory or storage device. It is a specialized form of computer memory. In the case of Internet, cachet is commonly used in the context of browser cache is designed to speed up the computer by prioritizing its content for quick access.

42
Q

What is a list of websites The people using a particular computer had visited?

A

History

43
Q

What are the small pictures that represent the programs on the computer called?

A

Icons

44
Q

This is your computers Internet protocol address, it is a four part or eight part electronic series of numbers this can look something like 202.3 .10 4.55 or a lot bigger with a lot more numbers complete with a dot or colons operations. Every computer, or phone, and device that accesses the Internet is assigned at least one of these things for tracking purposes. Whenever you browse, whenever you send an email or instant message, And whenever you download a file, this will act like a type of automobile license plate to enforce accountability and traceability. What is this thing called?

A

And IP address.

45
Q

What is a type of surveillance software considered to be either software or spyware that has the capability to record every keystroke you make to a log file, usually encrypted. This can record instant messages, emails, and any information you type at any time using your keyboard?

A

Keylogger

46
Q

Define keywords and tags/labels

A

Keywords are search terms used to locate documents.
Keywords are anywhere from 1 to 5 words long, separated by
spaces or commas.
Tags sometimes called labels are recommendation keywords. Tags and labels focus on cross-linking you truly content ellipses they are the modern evolution of suggestions for further reading.

47
Q

What is Internet service provider or ISP?

A

The company that provides Internet access to customers like Comcast.

48
Q

What is the modern-day fable or parable that spreads rapidly on the Internet? It can also be a joke mesmerizer story or an expression of speech.

A

Meme

49
Q

Why do computers use CAPTCHA checks?

A

They exist because humans find interpreting the string of letters relatively easy and computers do not. Setting up these checks there for blocks and automated process-such as one generating spam-from using the page, whereas a human is the label too.

50
Q

DOS

A

Disk operating systems, all PCs have this.

51
Q

What are the five things malware can do to you

A

One, vandalize your computer in someway.
Two, steal your private information.
Three, take no control of your computer or zombie your computer-for other ends.
Four, manipulate you into purchasing something.
Five, malware programs are the time bombs and we wicked minions of dishonest programmers

52
Q

Cookie

A

A small text file sent to your computer by a website you have visited. Websites use files to store information on your browser, such as login or registration identification, user preferences, and online shopping cart information.

52
Q

What is the coded format language used for creating documents on the world wide web and controlling how webpages appear?

A

Hypertext markup language or HTML.

52
Q

What is a monitoring software?

A

Software products that allow parents to monitor and tracked websites or email messages that a child visits or reads.

53
Q

What is net neutrality

A

A concept that insures everyone gets equal access to the Internet, whatever and whoever you are.

54
Q

What is netiquette?

A

Chrissy, honesty, and polite behavior on the Internet

55
Q

What is created when computers are connected, allowing people to share information. The Internet is an example of a large one of these. This here at NDA, is an example of a small one of these.

A

A network

56
Q

What a software that manages computer hardware and software resources and provide services for computer programs?

A

Operating system or OS

57
Q

What is Pharming?

A

Online scam that attacks the browser’s address bar. Users just type in what they think is a valid website address and are unknowingly directed to a illegitimate site that steals their personal information.

58
Q

What is POP3?

A

A protocol for receiving an email by downloading it to computer for my mailbox on the server of Internet service provider.

59
Q

What is protocol to send email also known as Simple mail transfer protocol?

A

SMTP

60
Q

What is an online scam that you this email to fish for users private information by imitating legitimate companies? The scammers copy legitimate website and set up nearly identical pages so people are lured into sharing passwords, account information, or credit card numbers.

A

Phishing

61
Q

What is illegally copying copyright software, music, or movies?

A

Piracy.

62
Q

What is a software that extends the capabilities of your browser? They may allow you to play multimedia or audio files for example

A

Plug-ins

63
Q

What is an audio show that is broadcast over the web and may include talkshows, music, or other types of audio?

A

Podcasts

64
Q

What is switch the computer off and on again allowing it operating systems and programs to be reloaded? It also requires that all software is completely reloaded.

A

A reboot

65
Q

What is the program that searches for information on the World Wide Web but looking for specific keywords and returns a list of information found on that topic?

A

Search engine

66
Q

What is the ConMan art of talking directly to people to trick them into divulging passwords and their private information. All of these are some form of a masquerade or fishing attack, designed to convince you that the Hocker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face time interview to deceive you. Common attacks may include greeting cards for this lottery winnings stuck investment scams warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you.

A

Social engineering.

67
Q

What is unwanted email from someone you not know send out info. It is usually trying to sell you something.

A

Spam

68
Q

What is software that secretly monitors a computer’s activity, attempting to gain private information without the computer users knowing?

A

Spyware

69
Q

What is the exchange of video clips, sound, or other types of media over the Internet? It is a way for the user to quickly download these files.

A

Streaming

70
Q

What is someone who attempts to gain infamy in chat or on forums by use of, but not limited to links to disturbing items, bashing others, copying or mimicking others real personal posts, and they want you to cause an argument or disruption to the forum

A

Troll

71
Q

What is the small message sent by user on the website Twitter?

A

Tweet

72
Q

What is the specific location or address of material on the Internet?

A

Uniform resource locator or the URL.

73
Q

What is a flash memory data storage device integrated with a USB 1.1, 2.0, or 3.0 interface. They are usually removable and rewritable?

A

USB flash drive

74
Q

What are video camera set up on the home computer or laptop that can be accessed via the World Wide Web?

A

A WebCam

75
Q

What is a form of filtering that only allows connection to a pre-approved list of sites that are considered useful and a appropriate?

A

Whitelisting software.