MODULE-4-ITEC_101

0.0(0)
Studied by 13 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/135

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:17 PM on 1/2/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

136 Terms

1
New cards

Computer Architecture

The system attributes that have a direct impact on the logical execution of a program, including the instruction set, data representation, input/output mechanism, and memory addressing techniques.

2
New cards

Computer Architecture

the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals

3
New cards

Computer Organization

The operational units and their interconnections that realize the architectural specifications, including control signals, interfaces between the computer and peripherals, and memory technology.

4
New cards

Generations

a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies

5
New cards

5 Generations of Computer

First Generation (1946-1959, vacuum tube based)

Second Generation (1959-1965, transistor based)

Third Generation (1965-1971, integrated circuit based)

Fourth Generation (1971-1980, VLSI microprocessor based)

Fifth Generation (1980-onwards, ULSI microprocessor board)

13, 6, 6, 9

6
New cards

Central Processing Unit (CPU)

The main component of a computer system that performs most of the processing inside the computer.

7
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.

8
New cards

Cybersecurity Threats

Potential risks and attacks that can compromise the security of computer systems and data, such as viruses, worms, ransomware, and phishing.

9
New cards

Encryption

The process of converting information into a code to prevent unauthorized access or data theft.

10
New cards

Authentication

The process of verifying the identity of a user or system to ensure authorized access.

11
New cards

Intrusion Detection

The process of monitoring and analyzing network traffic to detect and respond to unauthorized access or malicious activities.

12
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol, the set of protocols used for transmitting data over the internet.

13
New cards

DNS

Domain Name System, the system that translates domain names into IP addresses.

14
New cards

HTTP/HTTPS

Hypertext Transfer Protocol/Secure Hypertext Transfer Protocol, the protocols used for communication between web browsers and web servers.

15
New cards

Microcomputer

The smallest general purpose processing system, examples include IBM PCs and Apple computers.

16
New cards

Desktops

Type of microcomputer that cannot be carried around.

17
New cards

Portables

Type of microcomputer that can be used while traveling.

18
New cards

Laptop

A portable computer similar to a desktop but smaller in size.

19
New cards

Notebook

A powerful computer smaller in size than a laptop and desktop.

20
New cards

Palmtop (Hand held)

Also known as a personal digital assistant (PDA), a small computer that can be held in hands and used for word processing, spreadsheets, hand writing recognition, game playing, faxing, and paging.

21
New cards

Wearable computer

A very small computer that can be worn on the body, used in fields like medicine.

22
New cards

Workstations

Computers used in large, high-resolution graphics screen built in network support, engineering applications, software development, and desktop publishing.

23
New cards

Minicomputer

A medium-sized computer more powerful than a microcomputer, designed to serve multiple users simultaneously.

24
New cards

Mainframe (Enterprise) computers

Computers with large storage capacities and very high speed of processing, used for simultaneous use by a number of users.

25
New cards

Supercomputer

Computers with extremely large storage capacity and computing speeds many times faster than other computers, used for large scale numerical problems in scientific and engineering disciplines.

26
New cards

Hardware

The physical devices of a computer, including CPU, memory, bus, and storage devices.

27
New cards

Software

The programs of a computer, including the operating system and applications.

28
New cards

Structure

The way in which components of a computer relate to each other.

29
New cards

Function

The operation of individual components as part of the structure.

30
New cards

Data processing

The ability of a computer to process data in various forms.

31
New cards

Data storage

The ability of a computer to store data temporarily or permanently.

32
New cards

Data movement

The ability of a computer to move data between itself and the outside world.

33
New cards

Control

The control of data processing, storage, and movement functions.

34
New cards

Functional unit

The five functionally independent main parts of a computer - input, memory, arithmetic logic unit (ALU), output, and control unit.

35
New cards

Input unit

The part of a computer that accepts coded information from input devices.

36
New cards

Memory unit

The part of a computer that stores programs and data, divided into primary memory and secondary memory.

37
New cards

Word

A unit of data of a defined bit length that can be addressed and moved between storage and the computer processor.

38
New cards

Memory access time

The time required to access one word in memory.

39
New cards

Primary memory

The memory exclusively associated with the processor, where programs are stored while being executed.

40
New cards

Secondary memory

Memory used for storing large amounts of data and programs that are accessed infrequently.

41
New cards

Random-access memory (RAM)

Memory that can be reached in a short and fixed amount of time after specifying its address.

42
New cards

Read-only memory (ROM)

Memory that is only readable by the user and its contents cannot be altered.

43
New cards

Caches

Small, fast RAM units that are tightly coupled with the processor to achieve high performance.

44
New cards

Arithmetic Logic Unit (ALU)

The part of a computer processor where arithmetic and logical operations are executed.

45
New cards

Control Unit

The component of a computer that sends signals to other units and senses their states.

46
New cards

Output Unit

The part of a computer system that sends processed results to the outside world, such as printers, speakers, and monitors.

47
New cards

Software

Programs that are executed to perform various functions, such as receiving and interpreting user commands, running application programs, and operating systems.

48
New cards

System Software

Collection of programs that help run the computer hardware and system, including device drivers, operating systems, servers, utilities, and compilers.

49
New cards

Application Software

Software that allows end users to accomplish specific tasks, such as business software, computer games, databases, and word processing.

50
New cards

Malware

Malicious software used to breach a computer system's security policy, including viruses, worms, Trojan horses, logic bombs, and backdoors.

51
New cards

Virus

Malware that spreads by embedding copies of itself into files and is transported to the target through various means.

52
New cards

Worm

Malware that spreads by transmitting copies of itself via a network without the use of infected files.

53
New cards

Trojan Horse

Malware that is embedded in seemingly useful software, with an overt effect that hides its covert effect.

54
New cards

Logic Bomb

Malware that is triggered by specific events, such as a specific date or time, or the creation or deletion of a specific data item.

55
New cards

Backdoor

Malware that allows the initiator to gain access to the target without going through normal login and authentication procedures.

56
New cards

Security Attacks

Actions or techniques used to exploit vulnerabilities in a computer system's security.

57
New cards

Services

Functions or capabilities provided by a computer system to meet specific needs, such as authentication, encryption, and access control.

58
New cards

Mechanisms

Techniques or methods used to implement security services, such as firewalls, intrusion detection systems, and encryption algorithms.

59
New cards

Security attack

Any action that compromises the security of information owned by an organization.

60
New cards

Security mechanism

A mechanism that is designed to detect, prevent or recover from a security attack.

61
New cards

Security service

A service that enhances the security of the data processing systems and the information transfers of an organization.

62
New cards

Interruption

An attack on availability where an asset of the system is destroyed or becomes unavailable or unusable.

63
New cards

Interception

An attack on confidentiality where an unauthorized party gains access to an asset.

64
New cards

Modification

An attack on integrity where an unauthorized party not only gains access to but tampers with an asset.

65
New cards

Fabrication

An attack on authenticity where an unauthorized party inserts counterfeit objects into the system.

66
New cards

Passive attacks

Attacks that involve eavesdropping on or monitoring of transmissions without modifying the contents of the original message.

67
New cards

Active attacks

Attacks that involve modification of the data stream or the creation of a false stream.

68
New cards

Masquerade

An active attack where one entity pretends to be a different entity.

69
New cards

Replay

An active attack that involves the passive capture of a data unit and its subsequent transmission to produce an unauthorized effect.

70
New cards

Modification of messages

An active attack where some portion of a message is altered or the messages are delayed or recorded to produce an unauthorized effect.

71
New cards

Denial of service

An active attack that prevents or inhibits the normal use or management of communication facilities.

72
New cards

Computer security

The processes and mechanisms by which digital equipment, information, and services are protected from unintended or unauthorized access, change, or destruction.

73
New cards

Cryptography

The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form.

74
New cards

Cryptographic systems

Systems that are generally classified based on the type of operations used for transforming plain text to cipher text, the number of keys used, and the way in which the plain text is processed.

75
New cards

Encryption

The process of encoding a message so that its meaning is not obvious.

76
New cards

Decryption

The reverse process of encryption, transforming an encrypted message back into its normal, original form.

77
New cards

Cryptanalyst

A person who studies encryption and encrypted messages and tries to find the hidden meanings (to break an encryption).

78
New cards

Confusion

A technique in cryptography for ensuring that ciphertext has no clue about the original message.

79
New cards

Diffusion

A technique in cryptography that increases the redundancy of the plaintext by spreading it across rows and columns.

80
New cards

Substitution Cipher

A method of encryption where each plaintext character is replaced with a different ciphertext character.

81
New cards

Monoalphabetic Substitution Cipher

A type of substitution cipher where the relationship between the ciphertext symbol and plaintext symbol is 1:1.

82
New cards

Additive Cipher

A type of monoalphabetic substitution cipher where a key value is added to the plaintext.

83
New cards

Affine Cipher

A type of monoalphabetic substitution cipher where each letter in the alphabet is mapped to its numeric equivalent and encrypted using a mathematical function.

84
New cards

Polyalphabetic Substitution Cipher

A type of substitution cipher where each occurrence of a character may have a different substitution.

85
New cards

Auto Key Cipher

A polyalphabetic cipher where the key is a stream of subkeys used to encrypt the corresponding characters in the plaintext.

86
New cards

Playfair Cipher

A polyalphabetic cipher where the secret key is made of 25 characters arranged in a 5x5 matrix.

87
New cards

Vigenere Cipher

A polyalphabetic cipher where the key stream is the repetition of the initial secret key stream.

88
New cards

Transposition Cipher

A method of encryption where the positions of units of plaintext are shifted according to a regular system.

89
New cards

Keyless Transposition Cipher

A method of transposition cipher where the text is written into a table column by column and transmitted row by row.

90
New cards

Keyed Transposition Cipher

A method of transposition cipher where the plaintext is divided into groups and the characters in each group are permuted.

91
New cards

Authentication

The process of confirming a user's identity in computer systems.

92
New cards

Biometrics

Authentication method that relies on the user's biological makeup, such as retina or fingerprints.

93
New cards

Public Key Infrastructure (PKI)

Authentication method that uses digital certificates to prove a user's identity.

94
New cards

Intrusion Detection

The process of monitoring computer systems or networks for signs of security problems or unauthorized access.

95
New cards

Intrusion Detection Systems (IDSs)

Software or hardware products that automate the process of monitoring and analyzing events for signs of intrusions.

96
New cards

Information Sources

The different sources of event information used to determine whether an intrusion has taken place.

97
New cards

Analysis

The part of intrusion detection systems that organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place.

98
New cards

Response

The set of actions that the system takes once it detects intrusions, typically grouped into active and passive measures.

99
New cards

Strong Passwords

Different user ID/password combinations for different accounts, avoiding writing them down, and making passwords more complicated by combining letters, numbers, and special characters.

100
New cards

Firewall

The first line of cyber defense that blocks connections to unknown or bogus sites and keeps out some types of viruses and hackers.

Explore top notes

note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)
note
Invisible Man Chapter 1
Updated 1173d ago
0.0(0)
note
Media & Information Literacy
Updated 322d ago
0.0(0)
note
Invisible Man Chapter 7
Updated 1173d ago
0.0(0)
note
Unit 3 : Macromolecules
Updated 313d ago
0.0(0)
note
International Cooperation
Updated 1195d ago
0.0(0)
note
Biochimie
Updated 746d ago
0.0(0)

Explore top flashcards

flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)
flashcards
S.S. Unit 3 - Study Guide
57
Updated 126d ago
0.0(0)
flashcards
Chapter 27
120
Updated 705d ago
0.0(0)
flashcards
Lit Words: 2 The Boogaloo
24
Updated 496d ago
0.0(0)
flashcards
Lab Practical 3
75
Updated 755d ago
0.0(0)
flashcards
Polyatomic Ions
21
Updated 768d ago
0.0(0)
flashcards
Latin Week 5
26
Updated 920d ago
0.0(0)
flashcards
Connect 4, Unit 3
52
Updated 1011d ago
0.0(0)