ETECH LESSONS 1-3

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Control + T

Open a new tab

2
New cards

Control + W

Close the active tab

3
New cards

Control + Shift + T

Reopen the last closed tab

4
New cards

Control + Tab

Switch to the next tab

5
New cards

Control + Shift + Tab

Switch to the previous tab

6
New cards

Control + L or Alt + D

Select the URL bar

7
New cards

Control + F

Open the Find in page function

8
New cards

Control + P

Print the active page

9
New cards

Control + S

Save the active page

10
New cards

Control + J

Open the Downloads tab

11
New cards

Control + H

Open the History tab

12
New cards

Control + N

Open a new browser window

13
New cards

Control + Shift + N

Open a new Incognito window

14
New cards

F5

Reload the current page

15
New cards

ICT

The convergence of computing and telecommunications, encompassing all related technologies, including computing devices, systems, networks, infrastructure, and the people that build and use them.

16
New cards

Hardware

The physical components of computing devices, including processing units and input, output, and network devices.

17
New cards

Software

The programs that instruct computers on what to do.

18
New cards

Data

The information that is generated, processed, or stored by computing systems.

19
New cards

Infrastructure

The physical structures that connect technologies, including telephone and data lines, cellular towers, network cables and appliances, and satellites.

20
New cards

People

The people that build, program, and use technologies.

21
New cards

Internet of Things (IoT)

The collective term for "smart" devices that can connect to the Internet.

22
New cards

Cloud Computing

A model where computing resources are made available to users on-demand over the Internet.

23
New cards

Big Data

The term for large volumes of data being generated.

24
New cards

Machine Learning (ML)

One of the applications of artificial intelligence (Al), where computers are configured to learn from experience automatically.

25
New cards

Blockchain

A technology that provides a means for recording information securely and transparently.

26
New cards

Quantum Computing

A computing method that relies on quantum mechanics and uses qubits instead of bits.

27
New cards

Internet

The global network of computers that are connected by and communicate using standardized protocols.

28
New cards

World Wide Web (or the Web)

The global information system composed of pages and resources accessible through uniform resource locators (URLs) and connected by hyperlinks.

29
New cards

Computer network

A system that allows devices such as computers, mobile devices, routers, switches, and modems connected to it to communicate and share information.

30
New cards

Node

Each device on a network.

31
New cards

Modem

A device that connects your home network to the larger infrastructure that branches out to the Internet, converting digital data into signals that can be transmitted over cables or cellular connection.

32
New cards

Router

A device responsible for directing data packets to the right device.

33
New cards

IP address

A unique address automatically assigned to each node by the router to distinguish it from other devices.

34
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol)

A set of protocols that devices connecting to the Internet must follow.

35
New cards

HTTP (Hypertext Transfer Protocol)

A protocol used by the Web that facilitates the connection between web browsers and web servers to transmit and receive resources such as web pages.

36
New cards

HTML (Hypertext Markup Language)

A language used to code web pages.

37
New cards

FTP (File Transfer Protocol)

A protocol used to manage the transfer of files from a client computer and a server over TCP/IP.

38
New cards

ARPANET

The Internet's predecessor, created in 1969.

39
New cards

Creeper

The first computer virus, created in 1971.

40
New cards

Archie

The first Internet search engine, created in 1990.

41
New cards

URL (Uniform Resource Locator)

The identifier used for websites and webpages.

42
New cards

Threats

In computing, anything that can have a bad effect on a computer system or user.

43
New cards

Malware

Malicious software designed to do various undesirable actions against systems and users.

44
New cards

Viruses and Worms

Malware designed to copy itself from one source to another and executes a destructive task on the infected computer. Worms can spread automatically over a network or through email and messaging.

45
New cards

Trojans and remote access tools

Malware that provides hackers access to infected systems.

46
New cards

Spyware

Malware designed to steal sensitive information such as passwords and financial information from systems.

47
New cards

Adware

Hidden programs that monitor your online behavior and can generate a pop-up advertisement with spyware online.

48
New cards

Ransomware

Malware that encrypts the victim's computer files, locking users out until a ransom is paid.

49
New cards

Social Engineering

An attack where malicious actors manipulate or trick computer users into giving up sensitive information or performing unwanted actions.

50
New cards

Phishing

The most popular form of social engineering attack, consisting of fake messages sent through email, text, or instant messaging.

51
New cards

Vulnerabilities

Bugs and errors that can exist in applications and systems that hackers can exploit.

52
New cards

Denial-of-Service (DoS) attacks

Attacks that make computers and servers inaccessible to users.

53
New cards

Distributed Denial-of-Service (DDoS)

A form of DoS attack that depletes a computer or server's resources by flooding the system with traffic from a "botnet" or "bot network".

54
New cards

Password Attacks

Attempts to get into systems and applications by using techniques like brute force, which tries every combination of characters possible to guess a password.

55
New cards

Person-in-the-Middle

An attack where hackers try to get in the middle of a connection between two computers to intercept or change messages or information.

56
New cards

Injection and Cross-site Scripting (XSS)

Attacks where malicious code and scripts are "injected" into a website to intercept or steal information from that website's visitors or database.

57
New cards

Data Breaches

The goal of many cyberattacks, where hackers steal sensitive information from websites and systems of large organizations.

Explore top flashcards