Created by Victoria Heppinstall
over 7 years ago
|
||
Question | Answer |
Archive | A copy of a file kept away from the original and no longer in everyday use. |
Backup | A copy of a file in case of accidental or malicious loss of the original. |
Data | Raw facts and figures with no meaning. (eg. 011263) |
Decryption | Data is unscrambled by software using a key so that the data can be understood. |
Encription | Data is scrambled by software using a key so that the data cannot be understood by anyone viewing it. |
Encryption/Decription key | A password or PIN used to scramble/unscramble data. |
Firewall | Hardware or software security measure to control access to computer networks or systems, using rules set up by the user. |
Hacking | Accessing an ICT system without use of proper usernames or passwords; illegal hacking is unauthorised access. |
Information | Processed data put into context |
Malware | Malicious software that enters a computer system without the owner's consent and which harms the system. |
Password | A security measure to check the username is being used by the correct user. |
Personal Data | Data that can be used to identify you or provide information about you and your activities. |
PINs | Personal Identification Number: Four or more numbers used instead of a password. |
Spyware | Malicious software that sends details of data and activities of a computer system to others without knowledge of the owner of the system. |
Trojan horse | Malicious software that pretends to be a useful application but carries out other tasks. |
Unauthorised User | Someone who does not have permission to access or see the data. |
Username | This identifies a user to the ICT system so the system can allow them access. |
Virus | Malicious software that can replicate itself and cause harm to files by deleting, altering or by corrupting them. |
Worm | Malicious software that copies itself and uses networks to spread without a user helping them. |
Adware | Software that automatically downloads and installs on a computer system, which then advertises or directs the user to advertising material. |
Want to create your own Flashcards for free with GoConqr? Learn more.