computer science part of topics 1-6

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

What is cybercrime?

1 / 133

flashcard set

Earn XP

134 Terms

1

What is cybercrime?

crime committed using a computer or a network

New cards
2

What are four common types of email scams?

  1. Phishing

  2. Trojan horse (malware)

  3. Fraudulent requests for money

  4. Virus generated email

New cards
3

What is phishing?

An email that tricks you into handing over personal information (login details, bank details...)

New cards
4

What to look out for in a phishing email

The greeting is not personalised, poor spelling and grammar, sense of urgency, the sender's address is often a variation on a genuine address, request for personal information, forged link

New cards
5

What is Trojan horse and malware?

Send you something you want to look at like a funny video but is actually a virud

New cards
6

What is an advanced fee fraud?

A plea for help where they ask for money and in return you'll get millions of pounds

New cards
7

What is a virus generated email?

Will appear to be sent from a friend, that's friends email will have been infected by a virus

New cards
8

What is the computer misuse act of 1990

It's illegal to look at or modify someone else's files without permission

New cards
9

Define hacking

Hacking is illegally accessing or modifying computer files without permission

New cards
10

What are white hat hackers?

They are legal people who check for faults

New cards
11

Who are black hat hackers?

They are hackers with criminal interest

New cards
12

How do hackers do it?

  • Exposing security holes in websites to access information

  • Taking advantage of obvious/common usernames and passwords

  • Tricking people into downloading malware onto their computer, which in turn gives the hacker access to view and modify your files

New cards
13

What is malware?

software that is intended to damage or disable computers and computer systems.

New cards
14

What is a logic bomb?

A logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions

New cards
15

What is ransomware?

Ransomware is software illegally installed on a computer so that the user cannot access their files until a ransom is paid

New cards
16

What are 3 common types of malware?

  1. Browser functions

  2. File infector

  3. Macro virus

New cards
17

Can people legally hold info about you?

No

New cards
18

How long does copy right last?

life of author plus 70 years

New cards
19

What is plagiarism

the practice of taking someone else's work or ideas and passing them off as one's own.

New cards
20

What is phishing?

An attempt to trick someone into revealing his/her user name and password or other personal details.

New cards
21

How can phishing be prevented?

give no one your personal information and click on no links via sms

New cards
22

What is a brute force attack?

In a brute-force attack, an attacker simply tries to guess every possible combination for a password.

New cards
23

How can brute force attacks be prevented?

use strong and difficult to guess passwords.

New cards
24

What is malware?

software that is intended to damage or disable computers and computer systems.

New cards
25

What is malware short for?

malicious software

New cards
26

What is a DDoS attack?

A distributed denial of service attack is typically carried out by a botnet consisting of thousands of infected (zombie) computers which simultaneously send traffic to the targeted site.

New cards
27

What does DDoS attack stand for?

Distributed Denial of Service Attack

New cards
28

What is ransomware?

a type of malicious software designed to block access to a computer system until a sum of money is paid.

New cards
29

What is adware?

Software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits.

New cards
30

Can adware be prevented?

No, it usually isnt harmful and will only annoy the user or slow down the computer

New cards
31

What is data interception?

Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

New cards
32

What is a white hat hacker?

White hat hackers are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

New cards
33

what is a black hat hacker

Attackers who violated computer security for personal gain or to inflict malicious damage

New cards
34

What is SQL injection?

technique to manipulate a back-end database and retrieve information that was unauthorized

New cards
35

how can data interception be prevented?

Encryption

New cards
36

How can a DDoS attack be prevented?

firewalls

New cards
37

How can ransomware be prevented?

anti malware software

New cards
38

what is penetration testing

The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access

New cards
39

Algorithm

A series of steps designed to solve a mathematical or other problem

New cards
40

Instructions

A set of commands that a processor can recognise and act upon

New cards
41

Program

A stored set of instructions for a computer to execute

New cards
42

Software

The programs that run on a computer

New cards
43

Application

Software designed to carry out a useful real-world task

New cards
44

Platform

A combination of hardware and operating system that supports the running of particular applications

New cards
45

Programming language

A way of writing instructions for a computer to execute

New cards
46

Machine code

Instructions in binary used by the CPU

New cards
47

Low-level language

A programming language that is directed at controlling each machine operation

New cards
48

High-level language

A programming language that resembles a natural language. Each instruction translates to many machine instructions. it is problem based rather than machine based

New cards
49

Software engineering

Formal methods to guide the writing of software

New cards
50

Interface

The boundary between systems or between systems and humans

New cards
51

Compiler

Translation software that converts high-level source code into machine (object) code

New cards
52

Interpreter

Translation software that converts source code or user input into machine code which is immediately executed one instruction at a time.

New cards
53

Linker

Software that combines together a number of separate object code files

New cards
54

Debugger

Software that helps a programmer track down faults in a program

New cards
55

Operating system

The software that controls the hardware. It acts as an interface between the user and the hardware and also between the applications and the hardware

New cards
56

Self-booting

The ability of a program to load itself. Some small devices load their applications directly without the need for a conventional operating system

New cards
57

Web server

A server that handles requests to a website

New cards
58

Kernel

The lowest level of an operating system that controls the hardware

New cards
59

Process

A program currently being executed

New cards
60

Command Line

The place where types commands are given to the operating system

New cards
61

User interface

The boundary between the computer and the user

New cards
62

Graphical user interface

A user interface that makes use of icons for interacting with the user

New cards
63

Icon

A picture on screen that represents a file, program or an action

New cards
64

Shell

Software that provides a traditional text based interface to an operating system

New cards
65

Device driver

A program that enables communication between a computer and a periphral

New cards
66

Interrupt

A signal to the operating system to stop what it is doing and perform a different task instead

New cards
67

Applet

A small application that performs one specific task

New cards
68

Embedded system

A computer system that forms part of an electronic device

New cards
69

Firmware

Software that is stored permanently in a device, such as control programs for devices

New cards
70

Client

Software or hardware that request services from a server

New cards
71

Server

Software that provides services to a client, or the hardware that is running it

New cards
72

Utility

A small program designed to carry out a limited maintenance task

New cards
73

Virus detection

The process of discovering possibly harmful viruses in a computer system

New cards
74

Spyware

Malicious software that detects what a user is doing and sends the details back to the originator

New cards
75

Trojan

Harmful software that is disguised as something useful

New cards
76

Firewall

Software and/or hardware that limits access to and from a computer system

New cards
77

Disk Organisation

The process of arranging files and data bytes on a secondary storage device

New cards
78

Defragmentor

A utility that brings together file fragments on a disk and collects all the free space in one area

New cards
79

Editor

Software used for entering source code when writing a program

New cards
80

Pretty printer

An editor that automatically sets out program code in an easy to read way

New cards
81

Assembly language

A low-level programming language that uses more memorable mnemonic codes and labels to represent machine-level code. Each instruction corresponds to just one machine operation

New cards
82

Assembler

Software that translates assembly language code into machine code

New cards
83

Off the shelf

Software that is aimed at many users and is sold 'as is'

New cards
84

Custom written

Software developed specially for one or a few customers

New cards
85

Decimal to Binary

Divide by two and keep remainders to form binary (read from bottom up)

New cards
86

Decimal to Hex

Divide by 16 to get remainders (read from bottom up)

New cards
87

Binary addition

Normal addition form

1+0=1 1+1=0 (carry 1) 1+1+1=1 (carry one)

Make 8 bits by deleting first extra digit(s)

New cards
88

Binary subtraction

Same as addition, but make sure the binary is negative numbers

New cards
89

Binary multiplication

Find first number in binary

Add designated zeros (2- 1 zero, 4- 2 zeros, 8- 3 zeros)

Make it 8 bits by deleting first digits

New cards
90

Binary division

Find first number in binary

Get rid of designated number of digits on the right

Make 8 bits by adding 0's to the left ( if dividing by negative, add ones to the left)

New cards
91

What 2 digits does binary consist of?

1 and 0 (base 2)

New cards
92

What is a bit?

Short for a binary digit, it is the smallest unit if data a computer can hold.

New cards
93

What is a nibble?

4 bits.

New cards
94

What is a byte?

8 bits.

New cards
95

What is the largest denary number you can represent with 8 bits in binary?

255

New cards
96

what numbers can be represented in binary? (up to a byte)

1, 2, 4, 8, 16, 32, 64, 128

New cards
97

What is 0001 in denary?

1

New cards
98

what is 1111 in denary?

15

New cards
99

what is 7 in binary?

0111

New cards
100

What is 21 in binary?

00010101

New cards

Explore top notes

note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 30 people
... ago
4.5(2)
note Note
studied byStudied by 30 people
... ago
4.0(2)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 26 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(2)
note Note
studied byStudied by 72 people
... ago
5.0(1)
note Note
studied byStudied by 94 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (126)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 46 people
... ago
4.5(2)
flashcards Flashcard (54)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (235)
studied byStudied by 298 people
... ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (61)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (53)
studied byStudied by 16 people
... ago
5.0(3)
robot