Term
Specify the hardware needed for a computer system |
|
Definition
1. Input devices
2. computer it-self
3. output devices. |
|
|
Term
Specify memory needs for a computer; use correct terms, units. |
|
Definition
ROM is an unchanging type. Acts on “instincts,” don’t require learning to do. Part of comp’s motherboard.
RAM is changeable. RAM chips located right on motherboard. Short-term memory, NOT permanent.
Storage: Long-term memory that can be there for years to a lifetime |
|
|
Term
Explain software terms, such as “files” and “folders” |
|
Definition
Program files: instructions on how to do certain tasks.
Document files: data collected that is created/modified by program file.
Folder: a wrapper, an organizer. The folder itself does not contain data or information. |
|
|
Term
Specify at least three ways to make an existing computer faster |
|
Definition
1. Set monitor to display the MINIMUM number of colors.
2. Learn to use the keyboard shortcuts for common commands such as saving, copying, pasting, and the like
3. Learn to type better. |
|
|
Term
Specify where/how computers can be used in the scientific process |
|
Definition
1. Making observations. 2. Bibliographic databases to search up books/journals. 3. Formulate hypothesis + plan experiment. 4. Create diagrams with photo-editing, drawing, or paint program. 5. Use word processing program to type up research. 6. Gather data and STORE it in computer database. 7. Data manipulation and statistics. 8. Graphs/pictures 9. Professional Publication: spread the word of your research. 10. Presentation software |
|
|
Term
|
Definition
Secret entry point into a program.
The main purpose of a trapdoor is to allow developers to gain access by bypassing usual security procedures. |
|
|
Term
|
Definition
Oldest types of malicious software. Encoded in a legitimate program. Will set off at a certain time/date and modify files/disk. |
|
|
Term
|
Definition
An attractive program with hidden side-effects. Comes in a game or software upgrade. It will run the 'game' itself along with some additional hidden tasks.
Uses: propagate a worm/virus, install a backdoor, or simply destroy data |
|
|
Term
|
Definition
A self-replicating code attached to a program. |
|
|
Term
|
Definition
Automated propagating program. Often carries a zombie code. Replicates and transmits itself over the network |
|
|
Term
|
Definition
a. Dormant - waiting on trigger event b. Propagation - replicating to the programs or disks c. Triggering - by event to execute payload d. Execution - of the payload |
|
|
Term
|
Definition
Malicious software that resides in an infected system to attack a certain system specified by the attacker.
The hacker activates the resided zombie to make a connection to a designated system, usually a web server or sent as email spam. Zombies are often related to DDoS (Distributed Denial of Service), a kind of attack that paralyzed a service (web server). |
|
|
Term
Steps to preventing viruses |
|
Definition
1. Prevention: To block malware infection 2. Detection: To detect malware in infected systems 3. Reaction: To restore infected systems back to clean state |
|
|
Term
What is the one piece of software that every computer has to have? |
|
Definition
The system file. It controls the basic operations of the computer. All of the system files together form the operating system. |
|
|
Term
2 major things that affect the speed of a computer |
|
Definition
The computer’s processing speed, that is how fast it “thinks”, is controlled by the size of the bit unit the silicon chip can handle, the speed of the clock on the motherboard, and the presence and type of any coprocessor chips. The memory the computer uses for processing is the random access memory (RAM). |
|
|
Term
Computer’s thinking speed is determined by 3 things... |
|
Definition
-size of processing unit (chip) -speed of clock -presence of coprocessors. |
|
|