Computer Science Unit 8 Vocab

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 16

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

17 Terms

1

Computing Innovation

includes a program as an integral
part of its function. Can be physical (e.g. self-driving car),
non-physical computing software (e.g. picture editing
software), or non-physical computing concepts (e.g.,
e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation.

New cards
6

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

New cards
9

Cipher

the generic term for a technique (or algorithm) that performs encryption.

New cards
10

Caesar's Cipher

a technique for encryption that shifts the alphabet by some number of characters.

New cards
11

Cracking Encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

New cards
12

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

New cards
13

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

New cards
14

Symmetric Key Encryption

involves one key for both encryption and decryption.

New cards
15

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.

New cards
16

Multifactor Authentication

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

New cards
17

Computer Virus Scanning Software

protects a computing system against infection.

New cards
robot