1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
CPU
brain of computer
RAM
Temporary memory
SSD/HDD
Permanent storage
Router
Directs internet traffic
Modem
Connects to ISP
Firewall
Filters network traffic
Phishing
Scam messages
Ethernet
Wired internet
Wi-Fi
Wireless internet
HTTPS
Secure website
Switch
Connects devices in same network
HTTP =
80
HTTPS =
443
IP Address
device identifier
Motherboard
Connects components
PSU
Power supply unit
Virus
Attaches self to files/programs and spreads when executed
Worm
Spreads across networks by itself
Trojan horse
Pretends to be legitimate software but is malicious
Ransomware
Locks/encrypts files and demands payment
Spyware
Secretly collects user information
Adware
Shows unwanted ads
Rootkit
Hides malware and gives attackers deep system access
Keylogger
Records keystrokes/passwords
Bot/Botnet
Turns devices into remotely controlled machines
Malware
General term for malicious software