Fundamentals of Computers: Software, Digital Information, and Cybersecurity

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

Flashcards covering fundamentals of computers, including software, digital information, computer languages, programming terms, and cybersecurity issues.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

What is System Software?

Software that includes the operating system and utilities for maintaining a computer and its performance.

2
New cards

What does an Operating System provide to the user?

An interface to work with the computer hardware and applications.

3
New cards

Which company developed Windows OS, and what is its latest version mentioned?

Microsoft; Windows 10.

4
New cards

What is Cortana in Windows 10?

An intelligent assistant and search tool.

5
New cards

Which company produces the Mac operating system?

Apple.

6
New cards

What is unique about Linux as an operating system?

It is an open-source operating system, meaning its source code is freely available for anyone to use or modify.

7
New cards

What is the purpose of a Network Operating System?

Programs that control the flow of data among clients, restrict access to resources, and manage individual user accounts.

8
New cards

What is Unix primarily used for?

It is primarily a server operating system designed to run servers that support many users.

9
New cards

What is Android?

An open-source operating system initially developed by Google that runs mobile devices such as smartphones, tablets, and netbooks.

10
New cards

What is a computer language?

An encoded form of communication used to give commands or instructions to a device.

11
New cards

Why are Machine Language and Assembly Language considered 'Low-level' languages?

They need to be broken down into simple commands and electrical currents, and they are built into the hardware of specific devices.

12
New cards

What is a characteristic of a 'High-level' language?

It is more user-friendly and usually used to perform advanced calculations that can be used to organize data and execute functions over the internet.

13
New cards

How do computers communicate the state of electricity (on or off)?

Using 0 (for off) and 1 (for on), also known as Binary.

14
New cards

What is an assembly language?

A written language that gives names to binary code, making it easier to read, and helps translate advanced languages into binary.

15
New cards

How many bits are in 1 Byte?

8 Bits.

16
New cards

What is an Algorithm in programming?

A process or set of rules to be followed.

17
New cards

What is a 'Bug' in computing?

A computer error.

18
New cards

What does it mean to 'Debug'?

To find and correct a computer error.

19
New cards

What is a Virus in the context of computer programs?

A computer program that overwrites or modifies existing codes so they work incorrectly.

20
New cards

What is Data?

Information, often digital information broken down into 0s and 1s.

21
New cards

What is 'Hacking'?

To gain unauthorized access.

22
New cards

What is a Cyber Attack?

An offensive action that targets computer information systems, infrastructures, computer networks, or personal computer devices, using various methods to steal, alter, or destroy data or information systems.

23
New cards

What is Cybersecurity?

The protection of internet-connected systems such as hardware, software, and data from cyber-threats.

24
New cards

What is Phishing?

Carefully targeted digital messages transmitted to fool people into clicking on a link that can then install malware or expose sensitive data.

25
New cards

What is Ransomware?

Technologies that enable cybercriminals to kidnap an individual or organization's databases and hold all the information for ransom.

26
New cards

What is Cryptojacking?

Hijacking third-party home or work computers to 'mine' for cryptocurrency.

27
New cards

What are Cyber-Physical Attacks?

Hacks targeting electrical grids, transportation systems, water treatment facilities, etc.

28
New cards

What does DoS or DDoS Attack involve?

Overwhelming a system's resources so it cannot respond to service requests; a DDoS attack uses a large number of infected host machines.

29
New cards

What is a Malware Attack?

An attack involving unwanted software that is installed in your system.