Unit 5 and 6 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What’s an operating system?

A

AKA system software

Manages general running and functions happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What r the jobs it does/runs?

A
Memory management 
Hardware/peripheral “”
File “”
Security “”
Resource/process “”
User interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s is the user interface?

A

(Often) graphics that make computer easy to navigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does security management do?

A

In charge of backups/recovery
Data privacy aka encryption
Anti-hacking preventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does memory management do?

A

Protects data via having 1 item per location
What out how much processing/time each process needs
Works out what’s in use and what’s stored in Virtual RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Type of virus that is independent and replicates in order to spread to other computers or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data integrity

A

When data is accurate and is up to date

People storing data have to have it so that you can Trust that they’re serious about keeping your day to safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the hardware/peripheral management do?

A

Accesses the device drivers

Controls peripheral use via processes like program instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What r the responsibilities of the security?

A

Data recovery/backup
Data privacy I.e encryption
Preventing intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data privacy

A

Keeping Personal data from the public domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malicious software that has been put into a software to harm it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Breached data

A

Lost or corrupted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus

A

Program (code) that can replicate and/copy itself In order to delete/corrupt Files or cause On an active computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pharming

A

Installing malicious code on a computer or web server, redirecting unknowing user to a fake website to get hold of personal data
Passive form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data security

A

Data is secure if you can get to it and what’s available is the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Logic bombs

A

Like a time bomb that can do things such as deleting files/sending data to a hacker
Embedded into a program

16
Q

Trojan horses

A

Malware disguised as legitimate software, replacing or/part of the legitimate software to do harm

17
Q

Internet robots a.k.a. bots/zombie viruses

A

Not always harmful

Take control over computer system and can launch attacks

18
Q

Spyware

A

Software that watches for information such as what keys are pressed on the uses keyboard
A.k.a. key logging

19
Q

Validation

A

Way of ensuring that the data entered is correct, Like when Your password is checked
Not the same as verification

20
Q

Verification

A

Way of making sure that the data put in is correct by using a visual check or getting them to enter it twice
Not the same as validation

21
Q

What’s file management in charge of?

A

The naming conventions
User access measures
Directory structure

22
Q

Phishing

A

Sending legitimate look in emails with links/attachments that take users to fake websites or get them intoParting with personal data
Active form of malware

23
Q

Check digit

A

Digit added to a number to check if the data entered is error free

24
Q

Parity check

A

Way of checking if data transferred over network is odd/even via 1 bit

25
Q

Incremental backup

A

Backup software that backups the edited stuff

26
Q

Inconsistent state

A

Backups done when the user feels like it

27
Q

What does resource/process management handle?

A

Resolving conflicts-which processes that want the same resource should get it 1st and how long?
Scheduling which process gets CPU and for time period

29
Q

Checksum

A

Checks if transfer data has been changed or corrupted

Verification method