csc 199 3 notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:49 PM on 4/19/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

34 Terms

1
New cards

Privacy mode

Ensures browsing activity is not recorded on the hard disk.

2
New cards

Network adapter

Cards used to connect a computer to a network.

3
New cards

Cache

Memory that acts as a temporary high-speed holding area between memory and the CPU.

4
New cards

Virtual memory

Uses a hard drive to substitute for RAM.

5
New cards

Word

Number of bits accessed at one time by the CPU.

6
New cards

Cryptoprocessor

Specialty processor for protecting privacy.

7
New cards

Cookies

Small data files deposited on a user's hard disk when visiting a website.

8
New cards

Firewall

Acts as a security buffer between a corporation's private network and external networks.

9
New cards

Dictionary attack

Uses software to try common words sequentially to gain unauthorized access.

10
New cards

Parallel processing

Divides tasks into parts for multicore processors to be used effectively.

11
New cards

Identity Theft

Illegal assumption of someone's identity for economic gain.

12
New cards

Control unit

Directs electronic signal movement between memory and the arithmetic logic unit.

13
New cards

Phishing

Attempts to trick users with fake official-looking websites or emails.

14
New cards

Cyberbullying

Sending harmful or embarrassing content over the Internet.

15
New cards

Zombies

Infected computers controlled remotely for malicious purposes.

16
New cards

Power Supply

Unit in the system unit converting ac to dc and providing power.

17
New cards

Expansion slots

Allow users to expand systems on personal computers.

18
New cards

Sockets

Connection points for chips on the motherboard.

19
New cards

Buslines

Pathways supporting communication on the system board.

20
New cards

Clock speed

Represents the processing speed of a microprocessor.

21
New cards

Motherboard

Also known as the system board.

22
New cards

USB

Used to connect several devices to one unit.

23
New cards

True

RAM is considered temporary storage.

24
New cards

True

ROM has information stored by the manufacturer.

25
New cards

False

ALU does not tell the computer how to carry out a program's instructions.

26
New cards

Trojan Horse

Malicious programs disguised as something else.

27
New cards

3rd party Cookies

Used by advertising companies to track web activity.

28
New cards

1st party cookies

Store information about the current session and preferences on a website.

29
New cards

DoS Attack

Attempts to slow down or stop a computer system by sending repetitive requests.

30
New cards

False

Posting personal information does increase the chances of identity theft.

31
New cards

Worm

Replicates itself and clogs computers and networks.

32
New cards

Information resellers

Collect, analyze, and sell personal data.

33
New cards

Encryption

Coding information to make it unreadable without the key.

34
New cards

Access

Privacy issue related to data usage responsibility.