Computer Vocabulary Chapter 9
60 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of software is adware?

  • Utility software
  • Malicious software
  • Game software
  • Software that displays ads (correct)
  • What is the purpose of antivirus software?

    To prevent, detect, and remove malicious software.

    What is a backdoor program?

    A means of access that bypasses security mechanisms.

    What is the purpose of making a backup?

    <p>To create extra copies of data in case the original is lost or damaged.</p> Signup and view all the answers

    What does biometric authentication measure?

    <p>Intrinsic characteristics of a user.</p> Signup and view all the answers

    What defines a black-hat hacker?

    <p>An individual who breaches or bypasses internet security for malicious intent.</p> Signup and view all the answers

    What is a boot-sector virus?

    <p>A virus that infects the boot sector of disks.</p> Signup and view all the answers

    What is a botnet?

    <p>A network of private computers infected with malicious software.</p> Signup and view all the answers

    What does computer forensics involve?

    <p>Collecting, analyzing, and reporting on digital data legally.</p> Signup and view all the answers

    Define a cookie in web context.

    <p>A small text file stored on a user's computer by a website.</p> Signup and view all the answers

    What is cyberloafing?

    <p>Using Internet access at work for personal use while pretending to work.</p> Signup and view all the answers

    What constitutes a data breach?

    <p>A security incident where sensitive data is accessed without authorization.</p> Signup and view all the answers

    What is a denial-of-service attack?

    <p>An attack designed to flood a network with useless traffic.</p> Signup and view all the answers

    What does a distributed denial-of-service attack involve?

    <p>Multiple systems attacking a targeted system to flood it with traffic.</p> Signup and view all the answers

    What is a drive-by download?

    <p>A program downloaded to a computer without consent.</p> Signup and view all the answers

    How does an e-mail virus work?

    <p>It comes within an attached file in an email and activates when opened.</p> Signup and view all the answers

    What is an encryption virus?

    <p>A virus that uses encryption to avoid detection.</p> Signup and view all the answers

    What do exploit kits do?

    <p>Exploit security holes to spread malware.</p> Signup and view all the answers

    What function does a firewall serve?

    <p>To block unauthorized access while allowing outgoing communication.</p> Signup and view all the answers

    What does a geotag do?

    <p>Assigns a geographical location to digital content.</p> Signup and view all the answers

    Define a grey-hat hacker.

    <p>A hacker who sometimes violates laws without malicious intent.</p> Signup and view all the answers

    What is identity theft?

    <p>The fraudulent use of someone's private identifying information.</p> Signup and view all the answers

    What is an image backup?

    <p>A backup process that creates a copy of the operating system and data.</p> Signup and view all the answers

    What is an incremental backup?

    <p>A backup that includes only files altered since the last full backup.</p> Signup and view all the answers

    What is a keystroke logger?

    <p>Software that records every keystroke made on a computer.</p> Signup and view all the answers

    What is logical port blocking?

    <p>A technique to block unauthorized access to a computer through its ports.</p> Signup and view all the answers

    What is a logic bomb?

    <p>Instructions in a program that run under specific conditions.</p> Signup and view all the answers

    How does malware function?

    <p>It is intended to damage or disable computers and systems.</p> Signup and view all the answers

    What is the Master Boot Record?

    <p>Information in the first sector of a hard disk that loads the operating system.</p> Signup and view all the answers

    Define multi-factor authentication.

    <p>A security method requiring multiple pieces of evidence for access.</p> Signup and view all the answers

    What is a multipartite virus?

    <p>A virus that spreads in multiple ways.</p> Signup and view all the answers

    What does network address translation do?

    <p>Remaps one IP address space into another while data is transmitted.</p> Signup and view all the answers

    What is a packet analyzer?

    <p>A program that intercepts and logs network traffic.</p> Signup and view all the answers

    What does packet filtering do?

    <p>Controls network access by monitoring incoming and outgoing packets.</p> Signup and view all the answers

    Define a personal firewall.

    <p>A software application that protects a single computer from intruders.</p> Signup and view all the answers

    What is pharming?

    <p>A cyber attack that redirects website traffic to a fake site.</p> Signup and view all the answers

    What is phishing?

    <p>Defrauding an online account holder by posing as a legitimate company.</p> Signup and view all the answers

    What characterizes a polymorphic virus?

    <p>It can create modified copies of itself to avoid detection.</p> Signup and view all the answers

    What does pretexting involve?

    <p>Lying to obtain privileged data.</p> Signup and view all the answers

    What are program files?

    <p>Application files installed in a standard folder in Windows.</p> Signup and view all the answers

    What is quarantining in antivirus software?

    <p>Isolating infected files on a computer's hard disk.</p> Signup and view all the answers

    What is a rootkit?

    <p>Software tools that allow unauthorized access to a system without detection.</p> Signup and view all the answers

    What is scareware?

    <p>Malicious programs designed to trick users into purchasing unnecessary software.</p> Signup and view all the answers

    Define a script in programming.

    <p>Commands within a file that can be executed without compilation.</p> Signup and view all the answers

    What is social engineering?

    <p>The application of sociological principles to achieve specific goals.</p> Signup and view all the answers

    What is spam?

    <p>Irrelevant or inappropriate messages sent to a large number of recipients.</p> Signup and view all the answers

    What does a spam filter do?

    <p>Detects and prevents unwanted email from reaching a user's inbox.</p> Signup and view all the answers

    What is spear phishing?

    <p>Email that appears to be from a known contact but is malicious.</p> Signup and view all the answers

    What is spyware?

    <p>Software that covertly obtains information about a user's activities.</p> Signup and view all the answers

    What is a stealth virus?

    <p>A virus that uses mechanisms to avoid detection by antivirus software.</p> Signup and view all the answers

    What is a surge protector?

    <p>A device designed to protect electrical devices from voltage spikes.</p> Signup and view all the answers

    What is a time bomb in software?

    <p>Part of a program that functions after a predetermined date.</p> Signup and view all the answers

    What is a trojan horse in computer security?

    <p>A program that breaches security under the guise of performing a harmless function.</p> Signup and view all the answers

    What is a virtual private network?

    <p>A method using encryption for secure remote access to a computer over the Internet.</p> Signup and view all the answers

    What is a virus?

    <p>A piece of code that can copy itself and cause harmful effects.</p> Signup and view all the answers

    Define a virus signature.

    <p>A unique pattern used to detect and identify specific viruses.</p> Signup and view all the answers

    What characterizes a white-hat hacker?

    <p>A security specialist who tests and improves security systems.</p> Signup and view all the answers

    What is a whole-house surge protector?

    <p>A surge protection device mounted on a residential circuit breaker panel.</p> Signup and view all the answers

    What is a worm in cybersecurity?

    <p>A standalone malware program that replicates itself to spread.</p> Signup and view all the answers

    What defines a zombie computer?

    <p>A computer compromised by a hacker and used for malicious tasks.</p> Signup and view all the answers

    Study Notes

    Adware

    • Software that automatically displays or downloads unwanted advertising content when online.

    Antivirus Program

    • Computer software used to prevent, detect, and remove malicious software, initially focused on viruses.

    Backdoor Program

    • Method of bypassing security to access a computer program, can be used for legitimate troubleshooting or by attackers.

    Backup

    • Procedure for creating extra copies of data to prevent loss or damage.

    Biometric Authentication Device

    • Validates user identity through intrinsic characteristics like fingerprints, retinal scans, or voice patterns.

    Black-Hat Hacker

    • Expert in computer systems who breaches internet security for malicious purposes, also known as a cracker.

    Boot-Sector Virus

    • Type of virus infecting the boot sector of floppy disks or Master Boot Record (MBR) of hard disks.

    Botnet

    • Network of infected private computers controlled remotely, often for spamming.

    Computer Forensics

    • Practice of collecting and analyzing digital data for legal purposes, useful in crime detection and resolution.
    • Small text file created by websites to recognize users and track preferences, stored temporarily or permanently.

    Cyberloafing

    • Employees using workplace internet for personal activities while feigning legitimate work engagement.

    Data Breach

    • Security incident where sensitive data is accessed or used by unauthorized individuals.

    Data File

    • A file that consists of sensitive, protected, or confidential information, subject to data breaches.

    Denial-of-Service Attack

    • Attack designed to overwhelm network resources, often through excessive traffic, leads to service disruption.

    Distributed Denial of Service Attack

    • Involves multiple compromised systems attacking a single target, flooding it with traffic.

    Drive-by Download

    • Automatic download of software without user consent, often malicious in nature.

    E-mail Virus

    • Virus that spreads via email attachments, activated when the file is opened.

    Encryption Virus

    • Virus using encryption techniques to obscure its code from detection.

    Exploit Kits

    • Malicious toolkits aimed at exploiting software vulnerabilities to spread malware.

    Firewall

    • Security system controlling incoming and outgoing network traffic, blocks unauthorized access.

    Geotag

    • Electronic tag assigning geographical coordinates to digital content such as photos or social media posts.

    Grey-Hat Hacker

    • Hacker who may violate laws but lacks malicious intent, operating outside ethical boundaries for various motives.

    Hacker

    • Individual who unlawfully accesses computer data or networks.

    Identity Theft

    • Fraudulent acquisition and use of someone’s private information, often for financial purposes.

    Image Backup

    • Backup method that creates a copy of the operating system and all associated data as a single image file.

    Incremental Backup

    • Backup type capturing only the changes made since the last full backup.

    Inoculation

    • Process of introducing substances to produce immunity against diseases.

    Keystroke Logger

    • Surveillance software recording every keystroke made on a keyboard to capture sensitive information.

    Logical Port

    • Endpoint of a logical connection in TCP/IP and UDP networks, used for specifying server programs.

    Logical Port Blocking

    • Technique to secure a computer by preventing unauthorized access through specific network ports.

    Logic Bomb

    • Secretly embedded code that executes harmful instructions when triggered by certain conditions.

    Macro Virus

    • Virus that affects applications like Microsoft Word, automating actions once the application is triggered.

    Malware

    • General term for software designed to harm or disable computers and systems.

    Master Boot Record

    • Information in the first sector of a disk that initiates the booting of the operating system.

    Multi-Factor Authentication

    • Access control method requiring multiple forms of evidence for authentication.

    Multipartite Virus

    • Virus that spreads in multiple ways, with capabilities of infecting various parts of a system.

    Network Address Translation

    • Process modifying network address information in IP packet headers for routing.

    Packet Analyzer

    • Tool for intercepting and logging network traffic, assisting in analysis of classes of data.

    Packet Filtering

    • Firewall technique for regulating network access based on specific criteria like IP addresses and ports.

    Personal Firewall

    • Software protecting an individual computer from unauthorized access over the Internet.

    Pharming

    • Redirection of website traffic to malicious sites, exploiting vulnerabilities or altering hosts files.

    Phishing

    • Online scam targeting account holders to extract financial or personal information under false pretense.

    Polymorphic Virus

    • Capable of changing form to evade detection while replicating itself.

    Pretexting

    • Social engineering tactic where a false narrative is used to obtain sensitive information.

    Program File

    • Directory designated for non-operating system applications in Windows.

    Quarantining

    • Antivirus function that isolates infected files to prevent further damage.

    Rootkit

    • Underlying software tools allowing unauthorized control of a computer without detection.

    Scareware

    • Malicious software misleading users into purchasing unnecessary programs, often through fear tactics.

    Script

    • Series of executable commands commonly used in software, capable of running without compilation.

    Social Engineering

    • Strategies leveraging social principles to manipulate individuals into divulging confidential information.

    Spam

    • Unwanted digital communications sent to numerous recipients, often unsolicited advertisements.

    Spam Filter

    • Software designed to identify and block unwanted emails from reaching user inboxes.

    Spear Phishing

    • Targeted email fraud where attackers impersonate familiar contacts to steal sensitive data.

    Spyware

    • Covert software used to collect user information or monitor activities without consent.

    Stealth Virus

    • Virus employing various strategies to avoid detection by antivirus programs.

    Surge Protector

    • Device protecting electronic devices from voltage spikes by limiting excessive voltages.

    Time Bomb

    • Program feature that activates or deactivates functions after a predetermined time or date.

    Trojan Horse

    • Malicious software masquerading as legitimate software to bypass security systems.

    Virtual Private Network

    • Secure method allowing encrypted access to remote computers via the Internet.

    Virus

    • Self-replicating code that can corrupt systems or destroy data.

    Virus Signature

    • Unique identifying pattern of a virus used by antivirus software for detection.

    White-Hat Hacker

    • Computer security expert who tests and enhances system security, contrasting with malicious hackers.

    Whole-House Surge Protector

    • A surge protection device located on a residential power panel to safeguard all connected devices.

    Worm

    • Standalone malware that replicates itself to spread across networks without requiring a host program.

    Zombie

    • Compromised Internet-connected computer used to carry out malicious activities under remote control.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of essential computer terminology with our Chapter 9 vocabulary flashcards. This quiz covers important terms like adware and antivirus programs, providing definitions to enhance your understanding of computer software.

    More Like This

    Mandarin Computer Vocabulary Quiz
    5 questions
    Computer Vocabulary Words Quiz
    12 questions
    Computer Vocabulary Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser