ict ecdl revision 0.0 / 5 ? ICTICT ECDLOtherOther Created by: TianaCreated on: 14-01-14 12:28 What is Spam? unwanted messages sent by malicious advertisers to infect your PC 1 of 30 Email Email 2 of 30 Malicious programs computer programs designed to affect your computer & stop it from working 3 of 30 Anti-spam software prevents spam from reaching the inbox or deletes spam emails 4 of 30 Virus a program designed to infect your computer 5 of 30 Damaged data data that has been corrupted by viruses or malicious programs. 6 of 30 Worm program designed to put load on a network. Sent through email to infected PCs 7 of 30 Trojan horse performs an unexpected malicious action. i.e. erasing files etc. 8 of 30 Adware program that automatically downloads ads. Usually harmless 9 of 30 Spyware Installed secretly through the internet. Gathers personal information for advertisers. 10 of 30 Rogue diallers makes unauthorised phone calls using the internet connection on your network. 11 of 30 Data transfer downloading programs from the internet 12 of 30 Anti-virus software prevents/removes viruses 13 of 30 Disinfecting process of cleaning viruses from a PC 14 of 30 Anti-spyware software blocks any threats it comes across 15 of 30 Authentication establishing a User’s identity 16 of 30 Backup copy of data 17 of 30 Encrypt makes the data unreadable to anyone but the author or anyone who has access to the passwords 18 of 30 Hacker someone who illegally gains access and tampers with the information on a PC 19 of 30 Operating system management of the computer i.e. ‘Windows 7’ 20 of 30 PDA personal digital assistant, stores information such as addresses and phone numbers 21 of 30 Phishing when phishers pretend to be organisations such as banks in order to trick you in giving out personal info. 22 of 30 Systems administrator an IT member who operates a computer system or network. 23 of 30 Strong password one that is difficult to guess and uses a variety of odd patterns and numbers 24 of 30 Software incompatibility software systems that cannot operate together on the same computer. 25 of 30 Server provides shared resources such as email, databases and printers. 26 of 30 Smartphones a mobile phone offering advanced computer-like capabilities. i.e internet access and a built in keyboard 27 of 30 Unsecured network can be accessed by anyone without any permission 28 of 30 USB flashdrive portable data storage device that is one of the lightest ways of transfering and storing data 29 of 30 Wireless network linking all of the computers at home or work withoout cables and letting them share an internet connection. AKA 'wi-fi' 30 of 30
Comments
No comments have yet been made