Computer Maintenance and Cyber Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards generated from lecture notes on computer maintenance and cyber security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Computer Maintenance

Refers to the efforts to keep the computer in good working condition, protecting it from external factors and keeping software up to date.

2
New cards

Preventive Maintenance

Taking precautionary measures before a fault or issue arises in the computer, such as virus scanning, disk cleaning, and software updates.

3
New cards

Corrective Maintenance

Repairing or replacing components after a fault or issue has occurred in the computer to make it operational again.

4
New cards

Registry Clean Up Software

Software used to maintain the speed and proper functioning of a computer by cleaning up the Windows registry.

5
New cards

Temporary Files

Files created during computer usage that, if not erased, can occupy hard disk space and slow down the computer.

6
New cards

Cash Memory

Memory in the internet browser where cookies and temporary internet files are saved, which can slow down the computer if not cleaned regularly.

7
New cards

Anti-Virus, Anti-Spyware, Anti-Malware

Software used to protect a user's device from attacks by viruses, malware, and spyware, ensuring safer device usage.

8
New cards

Disk Clean Ups and Disk Defragmentors

Programs attached to the operating system that clean up hardware space and arrange files to maintain the computer's speed.

9
New cards

Auto Run

A program often attached to software that activates when a CD, DVD, or pendrive is inserted, seeking permission to set up the software.

10
New cards

Information Security

Protecting confidential information, which is restricted to authorized individuals or organizations and protected by legal obligations.

11
New cards

Digital Technology

Electronic devices, systems, and tools capable of processing, storing, and transmitting data in binary form.

12
New cards

Cyber Crime

Any action that violates societal norms or the law and is carried out online or using the Internet via computers, digital devices.

13
New cards

Hacking

Accessing or taking complete control of a website or computer network without permission.

14
New cards

White Hat Hackers

Legitimate hackers who check system security but do not harm the system; they are hired by organizations to test the security of their systems.

15
New cards

Black Hat Hackers

Illegal hackers or crackers who use the Internet and other networks to steal or destroy data, often exploiting software vulnerabilities.

16
New cards

Brute Force Attack

A cyber attack method in which an attacker systematically tries all possible combinations of passwords or encryption keys to gain unauthorized access to a system.

17
New cards

Data Interception

The process where someone intercepts digital information between the sender and receiver.

18
New cards

Encryption

The process of encoding information to prevent unauthorized individuals from reading or understanding it.

19
New cards

DDoS Attack (Distributed Denial of Service)

An attack that uses multiple devices to flood a website or online service with traffic, slowing it down or causing it to crash.

20
New cards

Malware

Software designed and developed to intentionally harm a mobile, computer, server, website, or computer network.

21
New cards

Cyber Bullying

Cyberterrorism, which involves forcing a person to do something through the use of information and communication technology, causing humiliation, threats, or spreading false information.

22
New cards

Fake News

False or misleading information presented as news that is intentionally spread to deceive people or influence opinions.

23
New cards

Two Factor Authentication (2FA)

A security process where an OTP (One Time Password) is sent to a user's phone or mail when logging in, requiring it for account access.

24
New cards

Internet Addiction Disorder (IAD)

A condition where individuals cannot resist the temptation of excessive computer or internet use, leading to negative impacts on their lives.

25
New cards

Piracy

The act of violating copyright law by illegally copying or creating something new by editing software without the consent of copyright holders.

26
New cards

Troubleshooting

A systematic process of identifying the source of a problem in ICT devices in order to solve it.