Topcit Topic 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards
System
A collection of interconnected components working toward a goal.
2
New cards
Open System
A system that interacts with its environment, e.g., Internet-based applications.
3
New cards
Closed System
A self-contained system with no external interaction, e.g., standalone software.
4
New cards
Dynamic System
A system that continuously adapts, e.g., AI-powered applications.
5
New cards
Operating System (OS)
Software that manages hardware and software resources on a computer.
6
New cards
Real-time OS
An operating system that processes data instantly for critical tasks.
7
New cards
Von Neumann Architecture
A computing model characterized by a CPU, memory, and I/O.
8
New cards
ALU (Arithmetic Logic Unit)
A component of the CPU that performs calculations.
9
New cards
TCP/IP
A standard for data communication over the Internet.
10
New cards
Cloud Computing
On-demand access to computing resources over the internet.
11
New cards
Fault Tolerance
The ability of a system to remain operational despite failures.
12
New cards
Big Data
Large-scale data management systems designed to handle massive datasets.
13
New cards
Encryption
The process of converting information into a coded format to prevent unauthorized access.
14
New cards
Multi-Factor Authentication (MFA)
A security mechanism that requires more than one form of verification.
15
New cards
Zero-Trust Security Model
Assumes no user or device is trusted by default and requires continual verification.
16
New cards
Incident Response Plan
A predefined strategy for managing and responding to security breaches.
17
New cards
Data Masking
The process of obscuring specific data within a database to protect it.
18
New cards
DDoS Attack
A Distributed Denial of Service attack intended to make services unavailable by overwhelming them.
19
New cards
Virtual Private Network (VPN)
A service that creates a secure connection over the Internet.
20
New cards
Machine Learning
A subset of AI that enables systems to learn from data and improve over time.
21
New cards
Blockchain
A decentralized and tamper-proof ledger used for secure transactions.
22
New cards
Edge Computing
Processing data closer to the source instead of relying on central cloud servers.
23
New cards
Data Loss Prevention (DLP)
A strategy for ensuring that sensitive data is not lost, misused, or accessed by unauthorized users.
24
New cards
SQL Injection
An attack where malicious SQL statements are inserted into an entry field for execution.
25
New cards
Cross-Site Scripting (XSS)
A security vulnerability that allows attackers to inject malicious scripts into web pages.