Digital Literacy Exam 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

system software

runs a computer or device, and includes other utilities

2
New cards

operating system (OS)

manages the operation of a device and lets you interact with it

3
New cards

platform

the type of OS

(windows, IOS, etc.)

4
New cards

user interface

the way you interact with a device

- Graphical user interface

- natural user interface

5
New cards

Graphical User Interface (GUI)

interacting with a device by typing text

6
New cards

Natural user interface

interacting with a device with movements, etc.

7
New cards

software types

closed or open source

8
New cards

closed software

hidden, controlled software

9
New cards

open source software

software free from restrictions

10
New cards

roles of an operating system

- file and folder management

- main memory and virtual memory

- booting

- customize the user environment

- customize the device's hardware components

- manage windows (maximize, minimize, close, restore...)

- manage resources

- provide utilities

- adjust power settings

- allow virtualization (multiple operating systems)

- security and file protection

- file compression

- manage file names/placement/properties

11
New cards

popular desktop operating systems

- Microsoft Windows

- Apple mac OS

- UNIX and Linux (open source software)

- Google Chrome OS

12
New cards

popular mobile operating systems

- android (from google, based on Linux)

- iOS (from apple, specifically for apple "i" devices only)

13
New cards

primary software categories

system software and application software (app)

14
New cards

installation/access type categories

- native app

- portable app

- web app

- mobile web app

- mobile app

15
New cards

native app

installed directly on a computer or device

16
New cards

portable app

runs from removable storage such as a USB drive or external hard drive

17
New cards

web app

accessed over the internet from a web browser

18
New cards

mobile web app

accessed over the internet from a web browser running on a phone or tablet

19
New cards

mobile app

installed and runs on a smart phone or tablet

20
New cards

platform specific

written for a specific operating system (native and mobile apps are platform specific)

21
New cards

responsive design

web app adjusts automatically to different sizes of screens/devices

22
New cards

some web app advantages

- created/updated quickly

- access your information on the go

- voice input and smart on-screen keyboard simplify interactions

23
New cards

some web app disadvantages

- not as fast & fewer features than native apps

- poor design can turn people away

- typing on small on-screen keyboard can be cumbersome

24
New cards

typical productivity apps

- word

- spreadsheet software

- presentation software

- database software

- email, calendar, note-taking, etc

25
New cards

word apps

processing for documents

26
New cards

spreadsheet software

for numbers and calculations

27
New cards

presentation software

for slideshows

28
New cards

database software

for managing files and records

29
New cards

productivity suite

a collection of apps packaged together

30
New cards

Microsoft productivity suite

office:

- word

- excel

- powerpoint

31
New cards

Apple productivity suite

iWork:

- pages

- numbers

- Apple Mail

32
New cards

Google productivity suite

G Suite:

- Google Docs

- Google Slides

- gmail

33
New cards

Apache productivity suite

Openoffice:

- writer

- calc

- impress

34
New cards

database

a collection of data organized for access, retrieval, and reporting

35
New cards

Databases provide capabilities to:

- add, update, and delete data

- filter, sort, and retrieve data

- create forms and reports

36
New cards

Relational database management system (RDBMS)

consists of a collection of tables that have columns and rows

37
New cards

RDBMS rows

hold records

38
New cards

RDBMS columns

hold fields which each have a name and data type

39
New cards

query

extracts data based on specified criteria or conditions

40
New cards

report

user-friendly layout of database content

41
New cards

form

screen used to view, enter, or update a record

42
New cards

digital image formats

bitmap images and vector graphics

43
New cards

bitmap images

based on pixels (picture elements, dots) and their color

44
New cards

vector graphics

use mathematical formulas to represent shapes and their colors (best for resizing)

45
New cards

graphics app categories

- paint apps

- photo and image editing apps

- video editing apps

- drawing apps (usually use vector graphics)

46
New cards

types of cyber attackers

- script kiddies

- hactivists

- cyberterrorists

- state actor

- brokers

47
New cards

script kiddies

use others software or instructions because they lack knowledge or skills

48
New cards

hactivists

motivated by principles or beliefs, or want to make a political statement

49
New cards

cyberterrorists

attack a nation's computers or networks to cause widespread disruption or panic

50
New cards

state actor

launch government-sponsored attacks against enemies

51
New cards

brokers

sell knowledge of uncovered vulnerabilities to other cybercriminals

52
New cards

malware

malicious software

53
New cards

types of malware

- virus

- trojan

- ransomware

- keylogger

54
New cards

virus

infects a computer program or file and then reproduces itself

55
New cards

trojan

hides inside or along with seemly safe software

56
New cards

ransomware

prevents access to a computer or scrambles data until money is paid

57
New cards

keylogger

captures a user's keystrokes to obtian private data, passwords, etc.

58
New cards

social engineering

attacks on people (phishing, hoaxes, or typo squatting)

59
New cards

risks of data collection

- data about you is gathered and kept in secret

- the accuracy of data about you cannot be verified

- identity theft can ruin the accuracy of data about you

- data about you is often used by others to make important decisions about you

60
New cards

physical health risks

Repetitive strain injury (RSI) and eyestrain

61
New cards

behavioral risks

- technology addiction

- sedentary lifestyle

- psychological or mental health issues

- hindered social interaction

- cyberbullying

62
New cards

environmental risks

electronic waste (e-waste) containing toxic chemicals and heavy metals

63
New cards

relationship between security and convenience

inverse relationship

security increases, convenience decreases

security decreases, convenience increases

64
New cards

making strong passwords

- long

- mix letters, numbers, and symbols

- don't use dictionary words, repeated characters or sequences, or birthdays, names, etc.

- Don't use the same password for multiple accounts

- use a password manager

65
New cards

multifactor authentication (MFA)

combo of something you know (password, pin, etc) and something you have (phone, token, etc) or biometrics aka something you are (fingerprint, face, eye characteristic)

66
New cards

software patches

fix a bug or security weakness

- install automatically or promptly

67
New cards

best thing to safeguard against data loss

make a backup copy

68
New cards

some things to help prevent social engineering attacks:

- think before you click

- don't open unexpected attachments

69
New cards

configure web browsers and antimalware

70
New cards

Things you can do to personally protect your privacy and personal data:

- limit subscriptions to mailing lists

- limit posting of personal information

- give only necessary info when completing an online form

71
New cards

ergononmics

The applied science of workspace design for efficiency and safety