Computers Final: Web, Hardware, Software & Cybersecurity Key Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

What is the difference between the Internet and the Web?

Internet = global network; Web = collection of websites on the Internet.

2
New cards

What is the difference between a webpage and a website?

Webpage = single page; Website = collection of webpages.

3
New cards

What is a browser? Give 3 examples.

Software to access web. Examples: Chrome, Safari, Firefox.

4
New cards

What is a URL?

Web address; includes protocol, domain, TLD, path.

5
New cards

What is the difference between a domain name and a URL?

Domain = website name; URL = full address including path.

6
New cards

What is a TLD? Give examples.

Domain ending (.com, .org, .net).

7
New cards

What is a secure website?

A site using HTTPS + encryption.

8
New cards

What are signs of a secure site?

Padlock, HTTPS, valid certificate.

9
New cards

What is a digital certificate?

Proof website is legitimate.

10
New cards

What is encryption?

Scrambling data for protection.

11
New cards

What is computer hardware?

Physical parts: CPU, RAM, keyboard, screen.

12
New cards

What is a multi-core processor?

CPU with multiple processing cores.

13
New cards

What is cache memory?

Fast memory built into CPU.

14
New cards

What does the Control Unit do?

Directs operations in the CPU.

15
New cards

What is the ALU?

Performs math and logic.

16
New cards

What are three types of memory?

RAM, ROM, Cache.

17
New cards

What is the difference between volatile and non-volatile memory?

Volatile loses power (RAM); non-volatile stores permanently (SSD).

18
New cards

Name three input and output devices.

Input: keyboard, mouse, scanner. Output: printer, speakers, monitor.

19
New cards

What is ASCII?

Code representing characters using numbers.

20
New cards

What is the difference between a bit and a byte?

Bit = 1 or 0; Byte = 8 bits.

21
New cards

What is the difference between HDD and SSD?

HDD = mechanical, slower. SSD = faster, no moving parts.

22
New cards

Name two cloud storage services.

Google Drive, iCloud.

23
New cards

What are two major computer platforms?

Windows, macOS.

24
New cards

What is system software?

Software managing hardware. Example: Operating System.

25
New cards

What are six functions of an operating system?

File management, memory management, security, multitasking, device handling, UI.

26
New cards

What is a GUI?

Visual interface with icons, windows, menus.

27
New cards

What is SaaS? Give an example.

Software delivered over the internet; example: Google Docs.

28
New cards

What are the three main operating systems?

Windows, macOS, Linux.

29
New cards

What is virtualization?

Running multiple OS on one computer.

30
New cards

What is the core of the OS?

Kernel.

31
New cards

What are common office file extensions?

.docx, .xlsx, .pptx.

32
New cards

What are mobile operating systems?

iOS, Android.

33
New cards

What is the difference between open source and closed source?

Open: editable by public. Closed: proprietary.

34
New cards

What are script kiddies?

Unskilled attackers using prebuilt tools.

35
New cards

What are hacktivists?

Hackers motivated by political causes.

36
New cards

What are cyberterrorists?

Attackers causing fear or disruption.

37
New cards

What are nation-state actors?

Government-sponsored hackers.

38
New cards

Who are insiders in cybersecurity?

Employees with harmful access.

39
New cards

What is the difference between cyberbullying and cyberstalking?

Bullying = repeated harassment; stalking = persistent monitoring.

40
New cards

Name two addictive social apps.

TikTok, Instagram.

41
New cards

What is malware?

Software designed to cause harm.

42
New cards

What is a virus?

Attaches to files and spreads.

43
New cards

What is a worm?

Self-replicates without user action.

44
New cards

What is a Trojan?

Disguised as a safe program.

45
New cards

What is ransomware?

Locks data until ransom is paid.

46
New cards

What is social engineering? Give an example.

Manipulating people; example: phishing.

47
New cards

What are five principles of social engineering?

Authority, intimidation, consensus, scarcity, urgency.

48
New cards

What is authentication?

Proving identity. Example: password + text code (2FA).

49
New cards

What are biometrics? Give examples.

Using physical traits: fingerprint, face ID.

50
New cards

What is the difference between encryption and decryption?

Encryption = scramble data. Decryption = decode data.

51
New cards

What is identity theft?

Stealing personal info; leads to financial loss.

52
New cards

How is information stolen?

Phishing, malware, breaches.

53
New cards

What are some protections against information theft?

Strong passwords, secure sites, 2FA.