Home
Explore
Exams
Search for anything
Login
Get started
Home
Topcit Topic 3
Topcit Topic 3
0.0
(0)
Rate it
Studied by 0 people
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/24
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
25 Terms
View all (25)
Star these 25
1
New cards
System
A collection of interconnected components working toward a goal.
2
New cards
Open System
A system that interacts with its environment, e.g., Internet-based applications.
3
New cards
Closed System
A self-contained system with no external interaction, e.g., standalone software.
4
New cards
Dynamic System
A system that continuously adapts, e.g., AI-powered applications.
5
New cards
Operating System (OS)
Software that manages hardware and software resources on a computer.
6
New cards
Real-time OS
An operating system that processes data instantly for critical tasks.
7
New cards
Von Neumann Architecture
A computing model characterized by a CPU, memory, and I/O.
8
New cards
ALU (Arithmetic Logic Unit)
A component of the CPU that performs calculations.
9
New cards
TCP/IP
A standard for data communication over the Internet.
10
New cards
Cloud Computing
On-demand access to computing resources over the internet.
11
New cards
Fault Tolerance
The ability of a system to remain operational despite failures.
12
New cards
Big Data
Large-scale data management systems designed to handle massive datasets.
13
New cards
Encryption
The process of converting information into a coded format to prevent unauthorized access.
14
New cards
Multi-Factor Authentication (MFA)
A security mechanism that requires more than one form of verification.
15
New cards
Zero-Trust Security Model
Assumes no user or device is trusted by default and requires continual verification.
16
New cards
Incident Response Plan
A predefined strategy for managing and responding to security breaches.
17
New cards
Data Masking
The process of obscuring specific data within a database to protect it.
18
New cards
DDoS Attack
A Distributed Denial of Service attack intended to make services unavailable by overwhelming them.
19
New cards
Virtual Private Network (VPN)
A service that creates a secure connection over the Internet.
20
New cards
Machine Learning
A subset of AI that enables systems to learn from data and improve over time.
21
New cards
Blockchain
A decentralized and tamper-proof ledger used for secure transactions.
22
New cards
Edge Computing
Processing data closer to the source instead of relying on central cloud servers.
23
New cards
Data Loss Prevention (DLP)
A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.
24
New cards
SQL Injection
An attack where malicious SQL statements are inserted into an entry field for execution.
25
New cards
Cross-Site Scripting (XSS)
A security vulnerability that allows attackers to inject malicious scripts into web pages.
Explore top notes
Doris Payne
Updated 809d ago
Note
Preview
Unit 03: Winning Independence (1776-1777)
Updated 907d ago
Note
Preview
Theme of Deception in Othello
Updated 871d ago
Note
Preview
Spanish Preterite
Updated 976d ago
Note
Preview
Chapter 12: Due Process Ascendant
Updated 998d ago
Note
Preview
Chapter 10 - The Age of Jackson
Updated 1103d ago
Note
Preview
unit 5 vocab
Updated 96d ago
Note
Preview
Chemistry Final
Updated 222d ago
Note
Preview
Explore top flashcards
Etapa 5 ¿Qué hay en tu cuarto?
Updated 56d ago
Flashcards (42)
Preview
Cô Yến 14/11/2024
Updated 210d ago
Flashcards (82)
Preview
CNPT 2 Exam 2
Updated 432d ago
Flashcards (216)
Preview
Japanese ~ Unit 2: My Home Life - Kanji
Updated 567d ago
Flashcards (46)
Preview
bio organismes 3 (copy)
Updated 778d ago
Flashcards (130)
Preview
(Chapter 18 - Cardiac) Lab Practical Semester II
Updated 475d ago
Flashcards (20)
Preview
PSYC 248 Exam 2
Updated 600d ago
Flashcards (113)
Preview
MM test 2
Updated 258d ago
Flashcards (101)
Preview