1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Computer Virus
a type of malware that spreads and infects other computers. Viruses can attach themselves to legitimate programs.
Cybersecurity
the practice of protecting systems, networks, and programs from digital attacks
Keylogging
a kind of malware that records every key pressed by a user
Malware
software that was designed to harm or take partial control over your computer.
Personally identifiable information
any data that can be used to distinguish or trace an individual's identity, either alone or when combined with other information
Phishing
a common security attack in which the victim is tricked into giving up personal information or downloading malware.
Targeted Marketing
a strategy that focuses promotional efforts on a specific, defined group of potential customers who share common characteristics, rather than a broad audience
Debugging
the process of identifying and removing errors from computer hardware or software.
DDoS (Distributed Denial of Service)
uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.
Rogue Access Point
a wireless access point that gives access to a secure network without the authorization of the network administrator.
Syntax Error
a character or string incorrectly placed in a command or instruction that causes a failure in execution.
Logic Error
a flaw in a program's code that causes it to produce incorrect or unintended results, despite running without crashing
Run Time Error
a problem that occurs while a program is running, not during compilation
Index Out of Bounds
when a program attempts to access an element at an index that is outside the bounds of the array
Rounding Error
the inaccuracies that occur when representing and performing calculations with real numbers using finite precision
Security
the right of an individual to control their personal information, including what is collected, how it is used, and with whom it is shared
Security
the practice of writing software that is resistant to security vulnerabilities by incorporating security measures throughout the development process