1/39
These flashcards cover key terms and concepts from the Computer Software Applications exam, focusing on definitions and explanations of essential terms in the subject.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Operating System
Software that manages computer hardware and software resources and provides services for computer programs.
RAM (Random Access Memory)
Volatile memory that temporarily stores data for currently running applications.
ROM (Read-Only Memory)
Non-volatile memory used to store firmware or system applications.
CPU (Central Processing Unit)
The primary component of a computer that performs most of the processing inside a computer.
ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication, representing text in computers.
Bit
The smallest unit of data in a computer, represented as a 0 or 1.
Byte
A group of 8 bits, which can represent a single character of data.
Network Topology
The arrangement of different elements (links, nodes, etc.) in a computer network.
Ethernet
A common method of networking computers in a LAN (Local Area Network).
IP Address
A unique address that identifies a device on the internet or a local network.
URL (Uniform Resource Locator)
The address of a web page on the internet.
Bandwidth
The maximum rate of data transfer across a network path.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Cloud Computing
The delivery of computing services over the internet, allowing for on-demand access to a shared pool of configurable resources.
Data Encryption
A method of protecting data by transforming it into a secure format that can only be read or processed after decryption.
Object-Oriented Programming
A programming paradigm based on the concept of objects that can contain data and code.
SQL Injection
A code injection technique that exploits a security vulnerability in an application's software.
API (Application Programming Interface)
A set of rules that allows one software application to interact with another.
Virtualization
The creation of a virtual version of something, such as a server, a storage device, or network resources.
Hacker
A person who uses technical skills to gain unauthorized access to systems or networks.
BIOS (Basic Input/Output System)
Firmware that initializes and tests hardware components during the booting process.
Backup
A copy of data stored separately for recovery in case of loss or corruption.
Ethernet Frame
The protocol data unit in Ethernet networks that includes MAC addresses and data.
Data Loss Prevention
Strategies and processes to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Access Control
The selective restriction of access to a place or resource.
DNS (Domain Name System)
The system that translates human-readable domain names to IP addresses.
SSL (Secure Socket Layer)
A standard security technology for establishing an encrypted link between a server and a client.
IoT (Internet of Things)
A network of physical devices connected to the internet to collect and share data.
Computer Virus
A malicious program that, when executed, replicates by inserting copies into other computer programs.
User Authentication
The process of verifying the identity of a user or device before granting access to a system.
Trojan Horse
A type of malware that disguises itself as legitimate software.
Data Breach
An incident where unauthorized access to sensitive data occurs.
Cloud Storage
A service model where data is stored in a remote server accessed over the internet.
Debugging
The process of identifying and removing errors from computer hardware or software.
Virtual Private Network (VPN)
A secure network that extends across a public network, allowing secure access to a private network.
Cryptography
The study of techniques for secure communication in the presence of third parties.
Computer Forensics
The discipline that combines elements of law and computer science to investigate and analyze data from computers.
UX (User Experience)
The overall experience a user has when interacting with a product, especially in terms of how pleasing or easy it is to use.