This site is 100% ad supported. Please add an exception to adblock for this site.

Technology Terms 221

Terms

undefined, object
copy deck
user interaction
how do viruses spread?
padlock icon, https
how can you tell if a website is secure?
CPU
central processing unit
network
two or more computers connected together via a telecommunication system to share info, resources, and communicate
radio waves
what do we use to communicate on wireless networks?
RAM
random access memory
our information is vunerable
why do we need to be aware of interet safety?
manage file systems, control input/ output devices, facilitates networks
what does the operating system do?
audio files
.mp3, .wav, .wma
.html
internet files
malware for profit, malware concealment, malware for profit
what are the parts of malware?
google.com
what is the domain name of this website www.google.com
digital rights management
DRM
encryption
the process of obscuring information to make it unreadable without special knowledge
license
permission to uses someone elses work
internet
all of the smaller networks in the world operating together
wired and wireless
2 types of networks are....
computer
programmable machine that stores, recieves, and processes data
.pdf
digital text
WEP and WPA
two main types of wireless security
access point
how we connect to a network
hard drive
large storage device
spam and phishing
what 2 things should be concerned about with email security?
1 kb
1000 bytes=
storage devices
2 primary- hard drive and RAM
intellectual property
product of the mind and protected under law
infectious malware
worms and viruses
key cyrptography
kind of cyrptography we studied in class
cryptography
study of message security
IP adress
unique, like a telephone number, assigned to all computers that communicate on the internet
.xls
excel
plagarism
taking someones ideas or writting and offering them as your own
blog
user generate website where entries are made in journal style and displayed in reverse chronological order
malware concealment
trogan horses
malware
what do firewalls protect against?
patents
the rights that protect devices, methods, processes, substances, and inventions; can eventually expire and run out
password
a form of secret authentication data used to secure access to a resource
webpage
a resource of information suitable for the world wide web and can be accessed by a browser
telecommunication system
sends data
share info, resources, and communicate
why do we have computer networks?
filter
controls where people go once they leave our network
slow down computer, steal information, delete files
why are viruses and worms harmful?
follow code of conduct, protect users and information
why do we have filters?
podcast
media files that are distributed by subscription over the internet using syndication
encryption
how do we secure wireless networks?
.zip
compressed files
drive
a device attached to a computer used to access information stored on various types of media
bytes
how we measure storage
1 GB
1000 MB=
antivirus software, windows updates, common sense, network security devices
how do we deal with malware?
firewall
network security device that will permit or deny traffic
to back up files
why do we have storage drives?
no
are wireless networks secure by default?
.exe
program- opens the program
IT
information technology
.ppt
power point
dynamic, static
2 types of content webpage usually have
RAM
fast storage device
tone
word choice, sentence structure
motherboard
how everything communicates with one another, runs input/ output devices
bcc
blind carbon copy, hides recipients
what you see is what you get
wysiwyg
popups, security holes, untrustworthy files, software bundling
what are the ways we get malware?
CPU
processes information, does all the calcualations
CPU, input/output devices, motherboard, storage devices
parts of a computer
to protect information
why do we have firewalls?
copyrights
rights that protect an idea or expression
output devices
how machines give us feedback; printer, speakers, monitor
spam
electronic junkmail
1 MB
1000 kb=
operating system
a set of computer programs that manage the hardware and software resources of a computer
video files
.avi, .wmv., .mpeg
html code
text
malware for profit
spyware
.doc
document
really simple syndication
RSS
phishing
an online con game used in attempt to get personal information
wiki
website that allows users to add, edit, or remove content
hypertext markup language
html
cc
carbon copy, no response necessary
input devices
how we communicate with computer; keyboard, microphone,mouse, pen, webcam
hertz
how we measure speed
picture files
.jpg, .bmp, .png, jif
domain name
way for humans to refer to websites
aggregator
collects all syndicated feeds like podcasts and blogs

Deck Info

85

permalink