Computer Science Unit 8 Vocab

studied byStudied by 0 people
0.0(0)
get a hint
hint

Computing Innovation

1 / 16

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

17 Terms

1

Computing Innovation

includes a program as an integral
part of its function. Can be physical (e.g. self-driving car),
non-physical computing software (e.g. picture editing
software), or non-physical computing concepts (e.g.,
e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation.

New cards
6

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

New cards
9

Cipher

the generic term for a technique (or algorithm) that performs encryption.

New cards
10

Caesar's Cipher

a technique for encryption that shifts the alphabet by some number of characters.

New cards
11

Cracking Encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

New cards
12

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

New cards
13

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

New cards
14

Symmetric Key Encryption

involves one key for both encryption and decryption.

New cards
15

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.

New cards
16

Multifactor Authentication

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

New cards
17

Computer Virus Scanning Software

protects a computing system against infection.

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 180 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 87 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 22 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 99 people
Updated ... ago
4.8 Stars(5)
note Note
studied byStudied by 138 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard25 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 5 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard64 terms
studied byStudied by 88 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard26 terms
studied byStudied by 1 person
Updated ... ago
4.0 Stars(1)
flashcards Flashcard119 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard43 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard600 terms
studied byStudied by 134 people
Updated ... ago
5.0 Stars(4)