csc 199 3 notes

  1. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Privacy mode
  2. ____ cards are used to connect a computer to a network network adapter
  3. ___ memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU. Cache
  4. ___ memory uses a hard drive to substitute for RAM. Virtual
  5. A ___ is the number of bits that can be accessed at one time by the CPU. word
  6. A type of specialty processor devoted exclusively to protecting your privacy. Cryptoprocessor
  7. Small data files that are deposited on a user's hard dick when they visit a website are called ____? Cookies
  8. A ___ acts as a security buffer between a corporation's private network and all external networks. Firewall
  9. A ___- attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. Dictionary
  10. For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core, an operation called ___. Parallel processing
  11. __ is the illegal assumption of someone's identity for the purposes of economic gain. Identity Theft
  12. Which of the following is a function of the control unit? It directs the movement of electronic signals between memory and the arithmetic logic unit.
  13. __ attempts to trick Internet users into thinking a fake but official looking website or email is legitimate? Phishing
  14. __ is the use of the Internet to send or post content intended to hurt or embarrass another person. Cyberbullying
  15. Computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for malicious purposes are called ___? Zombies
  16. Desktop computers have a and ___ unit located in the system unit that plugs into a standard wall outlet and converts ac to dc and provides the power to drive the system components. Power Supply
  17. Most personal computers allow users to expand their systems by providing these on the system boards? Expansion slots
  18. On the motherboard the connection points for chips are referred to as ___ sockets
  19. Pathways that support communication on the system board? Buslines
  20. The __ also known as system chastise. System unit
  21. The processing speed of a microprocessor is represented by its __ clock speed
  22. The system board is also known as ___ motherboard
  23. Which of the following can be used to connect several devices to one unit? Usb
  24. Ram is considered to be temporary storage? True
  25. Read only memory (ROm) have information stored in them by the manufacture. True
  26. The ALU tells the rest of the computer how to carry out a programs instructions. False
  27. __ are malicious programs that come into a computer system disguised as something else. Trojan Horse
  28. __ are used by advertising companies to keep track of your web activity as you move from one site to the next. 3rd party Cookies
  29. __ store information about current session, general preferences, and activity on the website. 1st party cookies
  30. __ attempts to slow down or stop a computer system or network by sending repetitive requests for information. Dos Attack
  31. Posting information such as birthdate, family member names, and address does not increase chances of identity theft. False
  32. Program that replicates itself and clogs computers and networks. Worm
  33. People that collect, analyze, and sell personal data are called ___. Information resellers
  34. __ is the process of coding information to make it unreadable except to those who have a special piece of information known as the key. encryption
  35. ___ a privacy issue relates to the responsibility to who can use data. Access