Exam3 - Flashcards - The flashcards are formatted for...

Info iconThis preview shows pages 1–25. Sign up to view the full content.

View Full Document Right Arrow Icon
Data Information
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Finished product; presented in a format that people can understand and use (used by humans). Raw material; symbols that represent facts, objects, and ideas (used by machines).
Background image of page 2
Memory 1. Leveling the playing field , enabling small companies to compete more effectively with large companies 2. Reversing the way of communication so customers are converging to business websites instead of businesses diverging
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
toward customers 3. Time is scarce, not capital
Background image of page 4
Networked economy has changed the way we do business by: The area where data can be stored temporarily.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Magnetic Storage Optical Storage
Background image of page 6
Stores data as microscopic light and dark spots on the disk surface; uses laser beams to punch disk, creating holes of 1s and 0s (i.e. CD and DVD). Stores data by magnetizing microscopic particles on the disk or tape surface (i.e. floppy disk and tape drive).
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Malware Solid State Storage
Background image of page 8
Stores data in an erasable, rewritable circuitry (electronic circuit or particles); non-volatile (i.e. USB flash drive). Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Virus Blended Threat Malware
Background image of page 10
Malware that combines more than one type of malicious program (i.e. Trojan carries virus, Trojan carries worm, or virus carries worm). Attaches itself to a file and replicates itself until the disk is full; contagious.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Trojan Horse Worm
Background image of page 12
Self-replicating program designed to carry out some unauthorized activity on a victim’s computer; not contagious. A computer program that seems to perform one function while actually doing something else; not contagious (i.e. keylogger and RAT).
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Time Bomb Logic Bomb
Background image of page 14
Piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met, (triggered by a condition; obeys a Computer program that has been written so that it will stop functioning after a predetermined date or time is reached (triggered by date or time, i.e. Michelangelo)
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
logical command).
Background image of page 16
Sector Cluster
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Smallest unit to store (smallest addressable unit of a physical storage medium); a collection of a certain number of contiguous sectors. Smallest unit to format; subdivisions of the tracks on a storage medium that provide storage areas for data.
Background image of page 18
TCP/IP Protocol
Background image of page 19

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
All services that use the Internet have their own protocol each, but all of them should abide by the Internet’s as well. Internet protocol.
Background image of page 20
HTTP 1. Power lines available in the house 2. Existing phone lines
Background image of page 21

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
To build a wired home network, it’s possible to use the: Web protocol.
Background image of page 22
Kernel Bootstrap Program
Background image of page 23

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
circuitry housed in the computer’s system unit; loads and initializes the operating system on a computer. Core part of the
Background image of page 24
Image of page 25
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/30/2011 for the course CGS 2100C taught by Professor Abadallah during the Spring '08 term at University of Central Florida.

Page1 / 126

Exam3 - Flashcards - The flashcards are formatted for...

This preview shows document pages 1 - 25. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online