1/25
Vocabulary flashcards generated from lecture notes on computer maintenance and cyber security.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Maintenance
Refers to the efforts to keep the computer in good working condition, protecting it from external factors and keeping software up to date.
Preventive Maintenance
Taking precautionary measures before a fault or issue arises in the computer, such as virus scanning, disk cleaning, and software updates.
Corrective Maintenance
Repairing or replacing components after a fault or issue has occurred in the computer to make it operational again.
Registry Clean Up Software
Software used to maintain the speed and proper functioning of a computer by cleaning up the Windows registry.
Temporary Files
Files created during computer usage that, if not erased, can occupy hard disk space and slow down the computer.
Cash Memory
Memory in the internet browser where cookies and temporary internet files are saved, which can slow down the computer if not cleaned regularly.
Anti-Virus, Anti-Spyware, Anti-Malware
Software used to protect a user's device from attacks by viruses, malware, and spyware, ensuring safer device usage.
Disk Clean Ups and Disk Defragmentors
Programs attached to the operating system that clean up hardware space and arrange files to maintain the computer's speed.
Auto Run
A program often attached to software that activates when a CD, DVD, or pendrive is inserted, seeking permission to set up the software.
Information Security
Protecting confidential information, which is restricted to authorized individuals or organizations and protected by legal obligations.
Digital Technology
Electronic devices, systems, and tools capable of processing, storing, and transmitting data in binary form.
Cyber Crime
Any action that violates societal norms or the law and is carried out online or using the Internet via computers, digital devices.
Hacking
Accessing or taking complete control of a website or computer network without permission.
White Hat Hackers
Legitimate hackers who check system security but do not harm the system; they are hired by organizations to test the security of their systems.
Black Hat Hackers
Illegal hackers or crackers who use the Internet and other networks to steal or destroy data, often exploiting software vulnerabilities.
Brute Force Attack
A cyber attack method in which an attacker systematically tries all possible combinations of passwords or encryption keys to gain unauthorized access to a system.
Data Interception
The process where someone intercepts digital information between the sender and receiver.
Encryption
The process of encoding information to prevent unauthorized individuals from reading or understanding it.
DDoS Attack (Distributed Denial of Service)
An attack that uses multiple devices to flood a website or online service with traffic, slowing it down or causing it to crash.
Malware
Software designed and developed to intentionally harm a mobile, computer, server, website, or computer network.
Cyber Bullying
Cyberterrorism, which involves forcing a person to do something through the use of information and communication technology, causing humiliation, threats, or spreading false information.
Fake News
False or misleading information presented as news that is intentionally spread to deceive people or influence opinions.
Two Factor Authentication (2FA)
A security process where an OTP (One Time Password) is sent to a user's phone or mail when logging in, requiring it for account access.
Internet Addiction Disorder (IAD)
A condition where individuals cannot resist the temptation of excessive computer or internet use, leading to negative impacts on their lives.
Piracy
The act of violating copyright law by illegally copying or creating something new by editing software without the consent of copyright holders.
Troubleshooting
A systematic process of identifying the source of a problem in ICT devices in order to solve it.