1/33
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Privacy mode
Ensures browsing activity is not recorded on the hard disk.
Network adapter
Cards used to connect a computer to a network.
Cache
Memory that acts as a temporary high-speed holding area between memory and the CPU.
Virtual memory
Uses a hard drive to substitute for RAM.
Word
Number of bits accessed at one time by the CPU.
Cryptoprocessor
Specialty processor for protecting privacy.
Cookies
Small data files deposited on a user's hard disk when visiting a website.
Firewall
Acts as a security buffer between a corporation's private network and external networks.
Dictionary attack
Uses software to try common words sequentially to gain unauthorized access.
Parallel processing
Divides tasks into parts for multicore processors to be used effectively.
Identity Theft
Illegal assumption of someone's identity for economic gain.
Control unit
Directs electronic signal movement between memory and the arithmetic logic unit.
Phishing
Attempts to trick users with fake official-looking websites or emails.
Cyberbullying
Sending harmful or embarrassing content over the Internet.
Zombies
Infected computers controlled remotely for malicious purposes.
Power Supply
Unit in the system unit converting ac to dc and providing power.
Expansion slots
Allow users to expand systems on personal computers.
Sockets
Connection points for chips on the motherboard.
Buslines
Pathways supporting communication on the system board.
Clock speed
Represents the processing speed of a microprocessor.
Motherboard
Also known as the system board.
USB
Used to connect several devices to one unit.
True
RAM is considered temporary storage.
True
ROM has information stored by the manufacturer.
False
ALU does not tell the computer how to carry out a program's instructions.
Trojan Horse
Malicious programs disguised as something else.
3rd party Cookies
Used by advertising companies to track web activity.
1st party cookies
Store information about the current session and preferences on a website.
DoS Attack
Attempts to slow down or stop a computer system by sending repetitive requests.
False
Posting personal information does increase the chances of identity theft.
Worm
Replicates itself and clogs computers and networks.
Information resellers
Collect, analyze, and sell personal data.
Encryption
Coding information to make it unreadable without the key.
Access
Privacy issue related to data usage responsibility.