Discovering Computers, Chapter 5 – Flashcards with Answers

Unlock all answers in this set

Unlock answers
question
SmartScreen Filter
answer
A way to adjust security settings offered by Internet Explorer
question
phishing
answer
A type of fraudulent e-mail that typically contains misspellings and dire warnings
question
authentication
answer
The process used to verify or identify computer users
question
biometrics
answer
Using physical features such as fingerprints, facial recognition, and retinal scans to verify a person's identity
question
smishing
answer
Using text messages to get you to download a mobile app that steals your information
question
worm
answer
Type of malware that spreads without human interaction, sending itself out to everyone in your address book
question
virus
answer
Type of malware that is spread when you distribute infected files, especially as e-mail attachments
question
spyware
answer
Type of malware that collects bits of data, like your surfing habits
question
piggybacking
answer
A slowed down Wi-Fi connection can be the result of this
question
White Hat
answer
Type of hacker that wants to show off their skills and doesn't intend any serious damage
question
hurricanes and storms
answer
Events that account for almost half of total catastrophic data losses
question
uninterruptible
answer
Type of power supply/battery backup device that can prevent some form of data loss
question
Black Hat
answer
Type of hacker who intends serious harm through espionage, theft, or disruption of a network
question
cyberterrorism
answer
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
question
Components of an online profile
answer
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons
question
Netiquette
answer
A set of online communication practices and rules
question
Identity theft
answer
The nation's fastest growing crime, where victims are unaware it's being committed until the damage is done
question
Driver's license, birth certificate
answer
Items an identity thief can obtain to impersonate you
question
malware
answer
Common forms include computer viruses, Trojan horses, and worms
question
adware
answer
Displays unwanted advertisements in banners or pop-up windows on your computer
question
bot
answer
Computer taken over by hackers to perform malicious tasks across a network
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New