1/56
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Control + T
Open a new tab
Control + W
Close the active tab
Control + Shift + T
Reopen the last closed tab
Control + Tab
Switch to the next tab
Control + Shift + Tab
Switch to the previous tab
Control + L or Alt + D
Select the URL bar
Control + F
Open the Find in page function
Control + P
Print the active page
Control + S
Save the active page
Control + J
Open the Downloads tab
Control + H
Open the History tab
Control + N
Open a new browser window
Control + Shift + N
Open a new Incognito window
F5
Reload the current page
ICT
The convergence of computing and telecommunications, encompassing all related technologies, including computing devices, systems, networks, infrastructure, and the people that build and use them.
Hardware
The physical components of computing devices, including processing units and input, output, and network devices.
Software
The programs that instruct computers on what to do.
Data
The information that is generated, processed, or stored by computing systems.
Infrastructure
The physical structures that connect technologies, including telephone and data lines, cellular towers, network cables and appliances, and satellites.
People
The people that build, program, and use technologies.
Internet of Things (IoT)
The collective term for "smart" devices that can connect to the Internet.
Cloud Computing
A model where computing resources are made available to users on-demand over the Internet.
Big Data
The term for large volumes of data being generated.
Machine Learning (ML)
One of the applications of artificial intelligence (Al), where computers are configured to learn from experience automatically.
Blockchain
A technology that provides a means for recording information securely and transparently.
Quantum Computing
A computing method that relies on quantum mechanics and uses qubits instead of bits.
Internet
The global network of computers that are connected by and communicate using standardized protocols.
World Wide Web (or the Web)
The global information system composed of pages and resources accessible through uniform resource locators (URLs) and connected by hyperlinks.
Computer network
A system that allows devices such as computers, mobile devices, routers, switches, and modems connected to it to communicate and share information.
Node
Each device on a network.
Modem
A device that connects your home network to the larger infrastructure that branches out to the Internet, converting digital data into signals that can be transmitted over cables or cellular connection.
Router
A device responsible for directing data packets to the right device.
IP address
A unique address automatically assigned to each node by the router to distinguish it from other devices.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A set of protocols that devices connecting to the Internet must follow.
HTTP (Hypertext Transfer Protocol)
A protocol used by the Web that facilitates the connection between web browsers and web servers to transmit and receive resources such as web pages.
HTML (Hypertext Markup Language)
A language used to code web pages.
FTP (File Transfer Protocol)
A protocol used to manage the transfer of files from a client computer and a server over TCP/IP.
ARPANET
The Internet's predecessor, created in 1969.
Creeper
The first computer virus, created in 1971.
Archie
The first Internet search engine, created in 1990.
URL (Uniform Resource Locator)
The identifier used for websites and webpages.
Threats
In computing, anything that can have a bad effect on a computer system or user.
Malware
Malicious software designed to do various undesirable actions against systems and users.
Viruses and Worms
Malware designed to copy itself from one source to another and executes a destructive task on the infected computer. Worms can spread automatically over a network or through email and messaging.
Trojans and remote access tools
Malware that provides hackers access to infected systems.
Spyware
Malware designed to steal sensitive information such as passwords and financial information from systems.
Adware
Hidden programs that monitor your online behavior and can generate a pop-up advertisement with spyware online.
Ransomware
Malware that encrypts the victim's computer files, locking users out until a ransom is paid.
Social Engineering
An attack where malicious actors manipulate or trick computer users into giving up sensitive information or performing unwanted actions.
Phishing
The most popular form of social engineering attack, consisting of fake messages sent through email, text, or instant messaging.
Vulnerabilities
Bugs and errors that can exist in applications and systems that hackers can exploit.
Denial-of-Service (DoS) attacks
Attacks that make computers and servers inaccessible to users.
Distributed Denial-of-Service (DDoS)
A form of DoS attack that depletes a computer or server's resources by flooding the system with traffic from a "botnet" or "bot network".
Password Attacks
Attempts to get into systems and applications by using techniques like brute force, which tries every combination of characters possible to guess a password.
Person-in-the-Middle
An attack where hackers try to get in the middle of a connection between two computers to intercept or change messages or information.
Injection and Cross-site Scripting (XSS)
Attacks where malicious code and scripts are "injected" into a website to intercept or steal information from that website's visitors or database.
Data Breaches
The goal of many cyberattacks, where hackers steal sensitive information from websites and systems of large organizations.