1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Backup
The process of copying the files on a computer to a safe location so that they may be available if something goes wrong. Full backups copy all the files that are currently on the drive, incremental backups copy what has chanced since the last full backup, differential backups log all the changes since the last full backup, and selective backups only copythose files the user indicates.
Cracker
Someone who accesses a computer or computer network illegally with the intent of stealing information, destroying data, or performing a malicious action.
DDoS
short for a distributed denial of service attack. It is an attack in which hackers use a collection of distributed computers to overwhelm a server online and thereby deny users of its services.
Decryption
The process of taking a chunk of encrypted data and converting it back to a form that can be read and used.
Hacker
A computer enthusiast who accesses a computer or network illegally. Often this is done for the challenge of getting past the security and not to do any malicious damage when inside
Script Kiddie
someone who lacks the technological skill to break into a computer or computer network, but who does so through the use of premade programs and hacker tools
Worm
Malware that works by copying itself repeatedly in memory or storage. While it does not directly damage files, the copies may eventually consume all available resources and cause the computer, device, or network to cease functioning