Computer Science Unit 8 Vocab

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:47 PM on 4/3/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Computing Innovation

includes a program as an integral
part of its function. Can be physical (e.g. self-driving car),
non-physical computing software (e.g. picture editing
software), or non-physical computing concepts (e.g.,
e-commerce).

2
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

3
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation.

6
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

7
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

8
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

9
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption.

10
New cards

Caesar's Cipher

a technique for encryption that shifts the alphabet by some number of characters.

11
New cards

Cracking Encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

12
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

13
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

14
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.

15
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.

16
New cards

Multifactor Authentication

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

17
New cards

Computer Virus Scanning Software

protects a computing system against infection.