csc 199 3 notes
- Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Privacy mode
- ____ cards are used to connect a computer to a network network adapter
- ___ memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU. Cache
- ___ memory uses a hard drive to substitute for RAM. Virtual
- A ___ is the number of bits that can be accessed at one time by the CPU. word
- A type of specialty processor devoted exclusively to protecting your privacy. Cryptoprocessor
- Small data files that are deposited on a user's hard dick when they visit a website are called ____? Cookies
- A ___ acts as a security buffer between a corporation's private network and all external networks. Firewall
- A ___- attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. Dictionary
- For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core, an operation called ___. Parallel processing
- __ is the illegal assumption of someone's identity for the purposes of economic gain. Identity Theft
- Which of the following is a function of the control unit? It directs the movement of electronic signals between memory and the arithmetic logic unit.
- __ attempts to trick Internet users into thinking a fake but official looking website or email is legitimate? Phishing
- __ is the use of the Internet to send or post content intended to hurt or embarrass another person. Cyberbullying
- Computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for malicious purposes are called ___? Zombies
- Desktop computers have a and ___ unit located in the system unit that plugs into a standard wall outlet and converts ac to dc and provides the power to drive the system components. Power Supply
- Most personal computers allow users to expand their systems by providing these on the system boards? Expansion slots
- On the motherboard the connection points for chips are referred to as ___ sockets
- Pathways that support communication on the system board? Buslines
- The __ also known as system chastise. System unit
- The processing speed of a microprocessor is represented by its __ clock speed
- The system board is also known as ___ motherboard
- Which of the following can be used to connect several devices to one unit? Usb
- Ram is considered to be temporary storage? True
- Read only memory (ROm) have information stored in them by the manufacture. True
- The ALU tells the rest of the computer how to carry out a programs instructions. False
- __ are malicious programs that come into a computer system disguised as something else. Trojan Horse
- __ are used by advertising companies to keep track of your web activity as you move from one site to the next. 3rd party Cookies
- __ store information about current session, general preferences, and activity on the website. 1st party cookies
- __ attempts to slow down or stop a computer system or network by sending repetitive requests for information. Dos Attack
- Posting information such as birthdate, family member names, and address does not increase chances of identity theft. False
- Program that replicates itself and clogs computers and networks. Worm
- People that collect, analyze, and sell personal data are called ___. Information resellers
- __ is the process of coding information to make it unreadable except to those who have a special piece of information known as the key. encryption
- ___ a privacy issue relates to the responsibility to who can use data. Access