Hardware/Software Flashcards

1
Q

Any software package that automatically render advertisements in order to generate revenue for its author.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer software used to detect, remove, and prevent malicious software, such as viruses, Trojans, malware, worms, etc.

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hidden method for bypassing normal computer authentication systems, primarily used to gain unauthorized access to a computer system.

A

Back Door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The abbreviation for “binary digit,” used to designate a single state of a computer value or signal, often notated a 0 or 1, false or true, off or on, low voltage or high voltage, etc.

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A virus carrying a built-in time delay so that the virus becomes active after a specific “incubation” time.

A

Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Derived from the word “robot,” _____ (also called zombies) automate tasks and provide information or services that would otherwise be conducted by a human being.

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A unit of digital information that most commonly consists of 8 bits. In Java, a _____ is an integer data type with a numerical range from -128 to 127.

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A small area of fast memory located on the mother board of a computer, used by the central processing unit.

A

Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The software on a machine that accesses a remote service on another server computer.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The main integrated circuit on the motherboard of a computer that is responsible for processing commands and data.

A

Central Processing Unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A collection of information that is organized so that it can easily be accessed, managed, and updated.

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of encoding messages or information in such a way that only authorized parties can read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A virtual wall in protection software that prevents certain types of network traffic from entering a network, usually by the use of port numbers, an Open Systems Interconnection (OSI) Level 4 feature.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A secondary storage device that plugs into the USE port of a computer.

A

Flash Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An old style secondary memory storage technology that indicates either 3.5 inch or the even older 5.25 inch disk that were flexible.

A

Floppy Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A newer style of program interface (as opposed to command line) that features dialog boxes, clicking features such as buttons, boxes, and radial buttons, commonly seen in most modern programs.

A

Graphical User Interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The primary device in a computer that is used for secondary storage, such as the operating system and various application programs needed by the computer to function.

A

Hard Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The physical devices in a computer system, such as the main unit, monitor, keyboard, printer, etc.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A general term for malicious software or code (called mail code) specifically designed to damage, disrupt, steal or inflict illegitimate action on data, hosts, or networks.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sometimes called a logic chip, is a computer process on a microchip. Contains all, or most of, the central processing unit (CPU) functions is the “engine” that goes into motion when you turn your computer on.

A

Microprocessor

21
Q

A display device for a computing system, such as a screen or projector.

A

Monitor

22
Q

The observation made in 1965 by Gordon Moore, co-found of Intel, that the number of transistors per square inch on integrated circuits had double every year since the integrated circuit was invent, and that this tend would continue for the foreseeable future.

A

Moore’s Law

23
Q

A type of computer architecture where a single physical processor contains the core logic of two or more processors.

A

Multicore Processor

24
Q

The simultaneous execution of more than one program or task by a single computer processor.

A

Multitasking

25
Q

A device used in computing to display or store information, such as a monitor, printer, or secondary storage device, like a flash drive.

A

Output Device

26
Q

A mode of computer operation in which a process is split into parts that execute simultaneously only different processors attached to the same computer.

A

Parallel Processing

27
Q

A computing device that is connected to the main unit, such as a monitor, keyboard, or mouse.

A

Peripheral Device

28
Q

A tactic used by internet attackers using fake emails or websites, appearing to come from a known and trustworthy source, in an attempt to gather personal or financial information from the recipients.

A

Phishing

29
Q

This means that the same program works on any platform (operating system) without needing any modification.

A

Platform-Independent

30
Q

This means that a program only works on the specific platform (operation system) for which it was defined.

A

Platform-Specific

31
Q

Main storage or memory, is the area in a computer in which data is stored fo quick access by the computer’s processor. The terms random access memory (RAM) and memory are often uses as synonyms for main storage.

A

Primary Storage

32
Q

A peripheral device in a computer system responsible for producing a printed output.

A

Printer

33
Q

The type of primary memory that is used by a computer in which to run programs and perform system operations.

A

Random Access Memory (RAM)

34
Q

The memory that is hard-wired and used for system functions, very difficult if not impossible to change.

A

Read Only Memory (ROM)

35
Q

A program (or set of programs) used to give unfettered administrative access to a machine. These programs attempt to hide the fact that a systems’ security has been compromised and usually provide a back donor.

A

Rootkit

36
Q

A type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. By using legitimate-looking notification showing a large number of viruses or infected files, users are scared into purchasing software to fix the problems.

A

Shareware

37
Q

Storage other than primary storage (RAM), such as hard drive, floppy drive, or flash drive.

A

Secondary Storage

38
Q

This term refers to either the software that is the server, or the hardware in which the server software is located.

A

Server

39
Q

A non-technical method of intrusion that relies on human interaction and often involves tricking people into breaking normal security procedures.

A

Social Engineering

40
Q

The programs and other operating information used by a computer.

A

Software

41
Q

Software that enables a user to obtain covert information about another computers’ activities by secretly transmitting data from their hard drive.

A

Spyware

42
Q

A set of files that contains the software that controls all of the functions of the computers, such as Windows, Linux, Unix, or Mac.

A

System Software

43
Q

Disguised as a legitimate software, _________ are a harmful piece of software that tricks users into loading and executing it on their systems. Unlike viruses and worms, they do not reproduce by infecting files, nor do they self-replicated.

A

Trojan

44
Q

An industry standard connection system developed in the mid-1990s that defines the cables, connectors, and communication protocols used in a bus for connection, communication, and power supply between computers and electronic devices.

A

Universal Serial Bus

45
Q

Memory that exists in secondary storage that is used in conjunction with primary memory (RAM) to help with program execution.

A

Virtual Memory

46
Q

A type of malware that propagates by inserting a copy of itself into another program. Almost all ________ are arrayed to an executable file, which means they will not be active or be able to spread until a user runs or opens the host file or program. _________ spread when the software or document they are attached to is transferred from one computer to another.

A

Virus

47
Q

A data file used to update an antivirus program so it can recognize new viruses as they are discoed and documented.

A

Virus Definitions

48
Q

Similar to viruses in that they replicate functional copies of themselves, but are standalone software that do not require a host program to propagate. To spread, _______ exploit a vulnerability on the target system or use social engineering to trick users into executing them.

A

Worm

49
Q

In computer science, a ______ is a computer connected to the INternet that has been compromised by a hacker, a computer virus, or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Bonnets of ______ computers are often used to spread e-mail spam and launch denial-of-service attacks.

A

Zombie