content chap 6

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:45 PM on 5/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

22 Terms

1
New cards

how user accounts prevent data loss and restrict data access

used to authenticate user

control access rights

with passwords

2
New cards

how to makes sure passwords are protected

  • run anti-spyware software

  • regularly change passwords

  • make sure they are difficult to break

3
New cards

how a firewall can be used to prevent data loss and restrict data access

  • software or hardware

  • placed between users computer and external network filtering information

  • checks data against a criteria

  • decides who is able to communicate with the computer

4
New cards

how antivirus software can be used to prevent data loss and restrict data loss

  • check files before loaded by computer

  • compare possible viruses against known viruses

  • heuristic checking

  • quarantine files

5
New cards

how anti spyware can be used to prevent data loss and restrict data access

  • detects and removes spyware programs

  • looks for typical features or based on known file structures

6
New cards

how encryption can be used to prevent data loss and restrict user access

if data is accessed illegally its impossible to understand it without encryption keys

will not stop deletion but can stop viewing

7
New cards

what is a virus

code that can replicate themselves with the intention of corrupting files or causing the computer to malfunction

8
New cards

what is phishing

sends a legitimate looking email

which contain a link to a fake website

to trick user onto entering personal details

9
New cards

what is pharming

malicious code installed

redirects user to a fake website without their knowledge

gaining personal details

dns cache posioning cache

10
New cards

how to stop accidental loss of data

use backups

save data on a regular basis

use access rights with user accounts

11
New cards

how to prevent data loss through hardware failure

back ups

use a uninterruptable power supply

12
New cards

hwo to prevent data loss through software fault

backups

save data on a regular basis incase of freeze

13
New cards

how to prevent data loss through incorrect computer operation

backups

correct training

14
New cards
15
New cards

ways of verifying data

double entry, visual check, check digit,checksum, paraity bit

16
New cards

how visual check works

entered data is compared to the original documents checked by a human

17
New cards

how check digit works

take seven numbers and perform and algorithm to work out the 8th and add it ti the furthest right position

the check digit is recalculated at the end and compared if different from the furthest right number its an error

method of checking for corrupwtion over data transfer

18
New cards

how to perform modulo 11 check digit on number

modulo 11

each digit given a weighting from one to 7 as there is 7 numbers from right to left

multiply the bit by its corresponding weighting

total - total mod 11

add number to the furthest right position

19
New cards

how a checksum works

method of checking for corruption over data transfer data is sent in blocks and the checksum is sent at the end of the data and is calculated on the receiving end

20
New cards

how to calculate the checksum

add all values of data

total of values divided by 256

total of all values-(total of values divided by 256 rounded down*256) = checksum

21
New cards

whats data security

methods taken to prevent unauthorised access to data and to recover data if lost or corrupted

22
New cards

whats data integrity

the accuracy completeness and consistency of data