Unit 10 ✔️ Flashcards

1
Q

Computing Innovation

A

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally Identifiable Information (PII)

A

information about an individual that identifies, links, relates, or describes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rogue Access Point

A

a wireless access point that gives unauthorized access to secure networks. It can see and modify network requests over an internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Key Encryption

A

involves one key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Encyrption

A

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Freeware

A

Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-factor Authentication

A

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Strong Password

A

something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly