Unit 8 Vocab

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:20 PM on 3/6/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

2
New cards

Personally Identifiable Information

information about an individual that identifies, links, relates, or describes them.

3
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

5
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

6
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

7
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

8
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

9
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

10
New cards

Caesar’s Cipher

a technique for encryption that shifts the alphabet by some number of characters.

11
New cards

Cracking Cipher

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

12
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.

13
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.

14
New cards

Multifactor Authentification

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

15
New cards

Computer Virus Scanning Software

protects a computing system against infection.

Explore top notes

note
Literary Devices
Updated 1277d ago
0.0(0)
note
Cell Cultures Study Guide
Updated 1069d ago
0.0(0)
note
act 2
Updated 1063d ago
0.0(0)
note
COMECE AQUI
Updated 41d ago
0.0(0)
note
Linear Functions
Updated 1376d ago
0.0(0)
note
Literary Devices
Updated 1277d ago
0.0(0)
note
Cell Cultures Study Guide
Updated 1069d ago
0.0(0)
note
act 2
Updated 1063d ago
0.0(0)
note
COMECE AQUI
Updated 41d ago
0.0(0)
note
Linear Functions
Updated 1376d ago
0.0(0)

Explore top flashcards

flashcards
Dossier arts: voc
37
Updated 828d ago
0.0(0)
flashcards
vocab
60
Updated 1050d ago
0.0(0)
flashcards
VET213 LAB END PRACTICAL SP2023
33
Updated 1044d ago
0.0(0)
flashcards
E2a - Family Members & Pets
33
Updated 427d ago
0.0(0)
flashcards
VFA Lessons 7-8
20
Updated 873d ago
0.0(0)
flashcards
trs06-unit1-p1
24
Updated 115d ago
0.0(0)
flashcards
Dossier arts: voc
37
Updated 828d ago
0.0(0)
flashcards
vocab
60
Updated 1050d ago
0.0(0)
flashcards
VET213 LAB END PRACTICAL SP2023
33
Updated 1044d ago
0.0(0)
flashcards
E2a - Family Members & Pets
33
Updated 427d ago
0.0(0)
flashcards
VFA Lessons 7-8
20
Updated 873d ago
0.0(0)
flashcards
trs06-unit1-p1
24
Updated 115d ago
0.0(0)