Unit 9-12 Flashcards

(58 cards)

1
Q

a small graphical element used to highlight or itemize a list

A

bullet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attempting to acquire information, such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a specific geographic location in which an access point provides public wireless broadband network services to mobile visitors through a WLAN

A

hotspot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a horizontal bar located at the bottom of the screen which contains shortcuts to applications and different settings

A

taskbar/dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a program that automatically fetches web pages which is used to feed pages to search engines

A

spider/(web)crawler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a connection point of the elements of a star network topology / a central connection point in the star network topology, which does not distinguish to which port data packets should be sent

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one of the main high-speed transition paths within a WAN

A

backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or re-launching their website in a window that cannot be closed

A

mousetrapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the amount of data that can be transmitted in a fixed amount of time or range within a band of frequencies or wavelength

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a computer hardware component that connects a computer to a computer network

A

network interface card/controller (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a point in a network or diagram at which lines or pathways intersect or branch / a connection point; a device linked in a network

A

node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a horizontal bar at the top of the window that displays the name of the program and active document

A

title bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a device that filters and forwards packets between LAN segments, but often not capable of much more

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a technique used to redirect a legitimate website’s traffic to another illegitimate website in order to gain access to a user’s banking information such as passwords of Internet bank accounts or credit card details / the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a computer program that searches the Internet for information, especially by looking for documents containing a particular word or group of words

A

search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a computer networking device that connects multiple switches, and their respective networks, to form a larger network / a device that forwards data packets along two or more networks

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an icon on the desktop that allows you to go immediately to a program, a website or a data file

A

shortcut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

to reverse the action of an earlier action

A

redo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

to move an object or text from the clipboard to a specific location

A

paste

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

to place an object (characters, words, pictures, etc.) between two other objects

A

insert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

to eliminate an object or text

A

delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

to select an object or text and store it in a temporary location often known as the clipboard, which is usually invisible to
the user

A

cut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

to highlight text or pick an object

A

select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

to use a mouse or other device to position the cursor over a particular area of a computer screen in order to cause a program to respond without clicking a button on the device

25
to adjust a line of type or piece of text so that the print fills a space evenly or forms a straight edge at both margins
justify
26
to send an email on to a further destination / to send an email that you have received to someone else
forward
27
to scan through a website to gain an impression of the contents
browse
28
to add a related document to an email
attach
29
to make a computer virus spread to another computer or program
infect
30
to combine the various versions of a file or folder
merge
31
to make data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents
encrypt
32
to send a signal, data, or other information to an alternate location / to change the direction of something, especially to send it to a different place
redirect
33
to make exact copies of themselves (of computer viruses)
replicate
34
a type of data transmission in which a single medium (coaxial cable or optical fibre) can carry several channels at once
broadband
35
a device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information
modem
36
the main transmission path within a WAN
backbone
37
a family of computer networking technologies commonly used in LANs and MANs / a LAN architecture that uses a bus or star topology and supports data transfer rates of 10 Mbps
ethernet
38
is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software
malware
39
is installed through a stolen password or by exploiting system vulnerabilities in order to gain constant administrator-level access to a computer or network
rootkit
40
replicates itself across a network and usually performs malicious actions; it does not need to attach itself to an existing program
worm
41
a vulnerability used by an attacker to collect an infected user's clicks / tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page
clickjacking
42
adds itself to an executable file and can cause considerable damage to the data on the infected computer
virus
43
collects and sends private information from the infected computer to the third party
spyware
44
presents unwanted advertisements embedded in the application
adware
45
stars connected to a bus
tree
46
the practice of sharing computer data or space on a network
file swapping
47
a copy of an e-mail message sent to a recipient without the recipient's address appearing in the message
blank carbon copy (BCC)
48
an e-mail utility that automatically replies to an e-mail message with a prewritten response when that e-mail comes into a specific e-mail or Internet address
autoresponder
49
the authoring language used to create documents on the Web
HTML
50
the term used to describe any link in any part of a software system that is intended to cause security breaches or damage to a system
malicious link
51
a message posted to a public Internet discussion group with the intent of provoking an angry response or argument over a topic
flame bait
52
a central connection point in the star network topology, which distinguishes to which port data packets should be sent
switch
53
a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual
domain
54
a record of the address of a website or other data made to enable quick access
bookmarks
55
to use someone/something for your own advantage
exploit
56
the average speed required to transmit data from the disk to the CPU, measured in megabytes per second
transfer rate
57
programs designed to help analyze, configure, optimize or maintain a compute
utilities
58
to identify the source of a problem and correct faults in a computer system, typically through a process of elimination, beginning with the most obvious or easiest problem to fix
troubleshoot