Midterm Study Guide: Modules 3&6 (Computer Hardware & Security and Safety)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Central Processing Unit (CPU)

a complex integrated circuit consisting of millions of electronic parts and is primarily responsible for covering input (data) into meaningful output (information)

2
New cards

Bus

data travels in and out of the CPU through a ______.

3
New cards

Computer Memory

responsible for holding data and programs as they are being processed by the CPU

4
New cards

Random Access Memory (RAM)

temporarily store open apps and document data while a computer is on

- connected to the CPU

-physical memory

5
New cards

Volatile Memory

losing contents

6
New cards

Involatile Memory

not losing contents

7
New cards

Read-only memory (ROM)

the portion of a computer's primary storage that does not lose its contents when one switches off the power

- Power-on self test (POST)

- Firmware (permanently embedded In electronic hardware for basic functions)

8
New cards

Virtual Memory

area of the hard disk that stores overflow data from RAM

9
New cards

Google Drive, Microsoft OneDrive, Dropbox

3 places to store electronic files

10
New cards

1. check for ideal location

2. check for necessary components

3. ensure that it is free from damage

4. connect all components and accessories then connect power

5. turn on computer, follow on-screen steps

5 Steps for installing computer hardware

11
New cards

peripherals

An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)

12
New cards

plug-and-play

a technology that allows new hardware components to be automatically detected and configured by the operating system without requiring manual intervention from the user, simplifying the process of adding peripherals like USB drives, webcams, and printers.

13
New cards

device driver

A software program that provides the instructions your computer needs to communicate with a device, such as a scanner.

- Without these, your operating system wouldn't know how to send commands or receive data from your hardware, effectively making the hardware unusable.

14
New cards

1. clean display with damp cloth

2. clean keyboard with compressed air

3. keep air vent free of dust and debris

4. keep environment temperature controlled

4 Steps to Maintain Computer Hardware (pt 1)

15
New cards

1. Protect from power fluctuations (using a surge suppressor and uninterruptible power supply)

2. keep free space on hard drive

3. keep away from from clutter/dust

4. regularly back up data

5. use protective cases for media

5 steps to Maintain Computer Hardware (pt 2)

16
New cards

uniterruptible power supply (UPS)

A battery power source that provides electric current during a power outage. Ex: Backup power generator

17
New cards

surge suppressor

electrical device inserted in a power line to protect equipment from sudden fluctuations in current

18
New cards

risk

the possibility something might occur that results in an injury or a loss

19
New cards

Information, Environment, and Health

What are three main types of hazards from computers?

20
New cards

informational risk

data and programs, comes from attackers who eat to steal data

21
New cards

environmental risk

toxic electronic components of computers and other digital devices that are exposed when devices are discarded

22
New cards

health risk

eye strain, poor posture when using devices, and muscle fatigue from keyboard typing

23
New cards

1. Script kitties/kiddies

2. hactivists

3. cyberterrorists

4. nation state actors

5. insiders

5 different types of Attackers

24
New cards

script kiddies

Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.

25
New cards

hactivists

Attackers who are strongly motivated by principles or beliefs.

26
New cards

cyberterrorists

seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction

27
New cards

nation state actors

Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries

28
New cards

insiders

legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

29
New cards

1. online banking

2. e-commerce shopping

3. fake websites

4. social media sites

5. data mining

5 different types of online risks

30
New cards

data mining

the process of analyzing data to extract information not offered by the raw data alone

31
New cards

1. virus

2. worm

3. trojan

4. ransomware

5. address spoofing

5 different types of malware

32
New cards

virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

33
New cards

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

34
New cards

trojan

A program disguised as a harmless application that actually produces harmful results.

35
New cards

ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

two main types are blocker and encrypting

36
New cards

address spoofing

changes an originating address or a destination address to redirect the flow of data between two parties

37
New cards

social engineering

attacks that attempts to trick the victim into giving valuable information to the attacker

38
New cards

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

39
New cards

hoax

a fake message, often an email, that claims a nonexistent computer virus or a severe threat is spreading rapidly and urges users to take specific actions to protect themselves, such as deleting files or forwarding the message to others.

40
New cards

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

41
New cards

1. reading wireless transmissions

2. viewing or stealing computer data

3. injecting malware

4. downloading harmful content

What are some wireless network risks?

42
New cards

1. only connect to an approved wireless network in public

2. limit the type of activity you do on public networks to simple web surfing or watching online videos

3. configure routers for a high level of security

What are some wireless network precautions?

43
New cards

strong password

a longer combination of letters, number, symbols

44
New cards

true

true or false: a longer password is always more secure than a shorter password regardless of complexity

45
New cards

15-20 characters

What is the minimum character length that security experts recommend in order to have a secure password?

46
New cards

false

true or false: we should use passwords that consist of dictionary/phonetic words

47
New cards

1. do not repeat characters or use sequences (abc, 123)

2. do not use birthdays, family member/ pet names, addresses or any personal information

2 password "don'ts"

48
New cards

password manager

a software application that stores and organizes encrypted passwords for a user and is accessed using a single, strong master password

49
New cards

encryption

the process of scrambling information so it cannot be read unless the user possesses the "key" to unlock it (decryption).

the key must be kept secure.

50
New cards

data-at-rest (hard drive) or data-in-transit (internet)

What can encryption be applied to?

51
New cards

digital certificate

a technology used to verify a user's identity and key that has been "signed" by a trusted third party

52
New cards

1. cookies

2. scripting

3. plug-ins

4. pop-ups

5. clear browsing data

6. plug-in validation

6 ways to configure browser security

53
New cards

cookies

small computer programs left behind on your computer when you visit a website

54
New cards

scripting

Simple programming that can be included in web pages to make them more interactive or dynamic.

55
New cards

plug-ins

Downloadable software extensions that add new features to a browser

56
New cards

pop-ups

Ads that appear when certain sites are accessed

57
New cards

plug-in validation

examines the plug-ins that are being used and alert the user to any out-of-date or known vulnerable plug-ins.

58
New cards

clear browsing data

The process of removing all cookies, browsing history, and other data tracked by a web browser.