Deck 2: Computer Terminology and History

Full screen (f)
exit full mode
Question
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?

A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
Question
Which of the following tells the computer in which order to access drives?

A) boot sequence
B) operating system
C) random access memory
D) application software
Question
What is Gopher?

A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
Question
Which of the following devices introduces commands and information to the computer?

A) scanner
B) modem
C) printer
D) keyboard
Question
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
Question
Who is hired by companies who want to test their security system by way of violations?

A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
Question
What is the purpose of random access memory in the computer system?

A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
Question
What is the most important component of a computer?

A) CPU
B) random access memory
C) motherboard
D) universal serial bus
Question
Which of the following interprets program instructions and processes data in the computer?

A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
Question
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

A) Trojan horse
B) malware
C) worm
D) logic bomb
Question
Which of the following refers to the unauthorized attempt to gain access to information about a system?

A) clickjacking
B) baud
C) banner grabbing
D) probe
Question
Which Windows operating system paved the way for the development of peer-to-peer networks?

A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
Question
Who was the first person to successfully introduce a device exclusively designed for data processing?

A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
Question
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?

A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
Question
For what purpose did British scientists build Colossus I?

A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
Question
What does the term wetware refer to?

A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
Question
Which of the following is the first modern digital computer?

A) ENIAC
B) Colossus I
C) ABC
D) GUI
Question
Which of the following computer components had its origin in the cathode ray tube?

A) printer
B) scanner
C) mouse
D) monitor
Question
What is the term used to describe the final destination of discarded, lost, or destroyed data?

A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
Question
For users, 24-hour accessibility equates to 24-hour vulnerability.
Question
Which of the following is known as the "baby" of computer operating systems and is freely distributed?

A) Windows
B) Macintosh
C) UNIX
D) Linux
Question
The first modern digital computer was built at Iowa State University.
Question
The Internet accompanied the introduction of the first computers.
Question
In which Mac OS did Apple introduce its first Unix-based operating system?

A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
Question
Unlike Microsoft, Macintosh introduced software advancement at a snail's pace.
Question
Worms refers to a code that causes damage to computer systems.
Question
Operating systems may be either single-user or multiple-user.
Question
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
Question
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
Question
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
Question
The smallest piece of data is called a bit.
Question
The Mosaic interface is an e-mail system.
Question
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S.census.
Question
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
Question
Software is composed of components that are physical or tangible in nature.
Question
Online predators often use chat rooms to lure their victims.
Question
Which of the following is structured to allow users to participate in real-time conversations?

A) chat rooms
B) news services
C) websites
D) video feeds
Question
Sony Ericsson introduced the first commercially available smart phone using the Symbian OS.
Question
How are websites identified?

A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
Question
________ was built by Professor Max Newman at a government lab in Buckinghamshire, England.
Question
Prior to the introduction of domain names, computers were accessed by their ________.
Question
Discuss how computers evolved.
Question
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
Question
The grouping of data that consists of eight bits is a ________.
Question
________ is a system in which a set of services, technologies, and often virtualized resources enable the delivery of computing as a service as opposed to a product.
Question
________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.
Question
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
Question
Discuss the original purpose behind the development of the Internet.
Question
Explain why UNIX is considered the backbone of the Internet.
Question
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
Question
________ is a term used to designate "good" hackers.
Question
________ are central switching devices for communications lines in a star topology.
Question
Originally, the Internet was funded in large part by ________ and was not available for commercial usage.
Question
A tangled code is also known as ________ code.
Question
A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.
Question
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
Question
The ________ is the heart of the UNIX operating system.
Question
Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.
Question
Explain how the Internet has become the backbone for global communications and transnational capitalism.
Question
Match between columns
John Atanasoff
was the first to successfully introduce a device exclusively designed for data processing
John Atanasoff
developed the first modern digital computer with partner Clifford Berry
John Atanasoff
designed an analytical engine that was ahead of the technology necessary to build it
John Atanasoff
built Colossus I
John Atanasoff
developed the Electronic Numerical Integrator and Computer
Max Newman
was the first to successfully introduce a device exclusively designed for data processing
Max Newman
developed the first modern digital computer with partner Clifford Berry
Max Newman
designed an analytical engine that was ahead of the technology necessary to build it
Max Newman
built Colossus I
Max Newman
developed the Electronic Numerical Integrator and Computer
Herman Hollerith
was the first to successfully introduce a device exclusively designed for data processing
Herman Hollerith
developed the first modern digital computer with partner Clifford Berry
Herman Hollerith
designed an analytical engine that was ahead of the technology necessary to build it
Herman Hollerith
built Colossus I
Herman Hollerith
developed the Electronic Numerical Integrator and Computer
Charles Babbage
was the first to successfully introduce a device exclusively designed for data processing
Charles Babbage
developed the first modern digital computer with partner Clifford Berry
Charles Babbage
designed an analytical engine that was ahead of the technology necessary to build it
Charles Babbage
built Colossus I
Charles Babbage
developed the Electronic Numerical Integrator and Computer
John Presper Eckert
was the first to successfully introduce a device exclusively designed for data processing
John Presper Eckert
developed the first modern digital computer with partner Clifford Berry
John Presper Eckert
designed an analytical engine that was ahead of the technology necessary to build it
John Presper Eckert
built Colossus I
John Presper Eckert
developed the Electronic Numerical Integrator and Computer
Question
Match between columns
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Time bomb
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Time bomb
the final destination of discarded, lost, or destroyed data
Time bomb
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Time bomb
an individual hired by a company to test its security systems by attempting to violate them
Bit bucket
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Bit bucket
the final destination of discarded, lost, or destroyed data
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Bit bucket
an individual hired by a company to test its security systems by attempting to violate them
Sneaker
a term used to refer to humans operating computers (as opposed to hardware and software)
Sneaker
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Sneaker
the final destination of discarded, lost, or destroyed data
Sneaker
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Wetware
a term used to refer to humans operating computers (as opposed to hardware and software)
Wetware
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Wetware
the final destination of discarded, lost, or destroyed data
Wetware
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Wetware
an individual hired by a company to test its security systems by attempting to violate them
Brute force
a term used to refer to humans operating computers (as opposed to hardware and software)
Brute force
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Brute force
the final destination of discarded, lost, or destroyed data
Brute force
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Brute force
an individual hired by a company to test its security systems by attempting to violate them
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Computer Terminology and History
1
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
B
2
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?

A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
C
3
Which of the following tells the computer in which order to access drives?

A) boot sequence
B) operating system
C) random access memory
D) application software
A
4
What is Gopher?

A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following devices introduces commands and information to the computer?

A) scanner
B) modem
C) printer
D) keyboard
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Who is hired by companies who want to test their security system by way of violations?

A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
What is the purpose of random access memory in the computer system?

A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
What is the most important component of a computer?

A) CPU
B) random access memory
C) motherboard
D) universal serial bus
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following interprets program instructions and processes data in the computer?

A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

A) Trojan horse
B) malware
C) worm
D) logic bomb
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following refers to the unauthorized attempt to gain access to information about a system?

A) clickjacking
B) baud
C) banner grabbing
D) probe
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Which Windows operating system paved the way for the development of peer-to-peer networks?

A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Who was the first person to successfully introduce a device exclusively designed for data processing?

A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?

A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
For what purpose did British scientists build Colossus I?

A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
What does the term wetware refer to?

A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is the first modern digital computer?

A) ENIAC
B) Colossus I
C) ABC
D) GUI
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following computer components had its origin in the cathode ray tube?

A) printer
B) scanner
C) mouse
D) monitor
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
What is the term used to describe the final destination of discarded, lost, or destroyed data?

A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
For users, 24-hour accessibility equates to 24-hour vulnerability.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is known as the "baby" of computer operating systems and is freely distributed?

A) Windows
B) Macintosh
C) UNIX
D) Linux
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
The first modern digital computer was built at Iowa State University.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet accompanied the introduction of the first computers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
In which Mac OS did Apple introduce its first Unix-based operating system?

A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike Microsoft, Macintosh introduced software advancement at a snail's pace.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Worms refers to a code that causes damage to computer systems.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
Operating systems may be either single-user or multiple-user.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The smallest piece of data is called a bit.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
The Mosaic interface is an e-mail system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S.census.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Software is composed of components that are physical or tangible in nature.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Online predators often use chat rooms to lure their victims.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is structured to allow users to participate in real-time conversations?

A) chat rooms
B) news services
C) websites
D) video feeds
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Sony Ericsson introduced the first commercially available smart phone using the Symbian OS.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
How are websites identified?

A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
________ was built by Professor Max Newman at a government lab in Buckinghamshire, England.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Prior to the introduction of domain names, computers were accessed by their ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss how computers evolved.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
The grouping of data that consists of eight bits is a ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
________ is a system in which a set of services, technologies, and often virtualized resources enable the delivery of computing as a service as opposed to a product.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the original purpose behind the development of the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
Explain why UNIX is considered the backbone of the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
________ is a term used to designate "good" hackers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
________ are central switching devices for communications lines in a star topology.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
Originally, the Internet was funded in large part by ________ and was not available for commercial usage.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
A tangled code is also known as ________ code.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
The ________ is the heart of the UNIX operating system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Explain how the Internet has become the backbone for global communications and transnational capitalism.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
John Atanasoff
was the first to successfully introduce a device exclusively designed for data processing
John Atanasoff
developed the first modern digital computer with partner Clifford Berry
John Atanasoff
designed an analytical engine that was ahead of the technology necessary to build it
John Atanasoff
built Colossus I
John Atanasoff
developed the Electronic Numerical Integrator and Computer
Max Newman
was the first to successfully introduce a device exclusively designed for data processing
Max Newman
developed the first modern digital computer with partner Clifford Berry
Max Newman
designed an analytical engine that was ahead of the technology necessary to build it
Max Newman
built Colossus I
Max Newman
developed the Electronic Numerical Integrator and Computer
Herman Hollerith
was the first to successfully introduce a device exclusively designed for data processing
Herman Hollerith
developed the first modern digital computer with partner Clifford Berry
Herman Hollerith
designed an analytical engine that was ahead of the technology necessary to build it
Herman Hollerith
built Colossus I
Herman Hollerith
developed the Electronic Numerical Integrator and Computer
Charles Babbage
was the first to successfully introduce a device exclusively designed for data processing
Charles Babbage
developed the first modern digital computer with partner Clifford Berry
Charles Babbage
designed an analytical engine that was ahead of the technology necessary to build it
Charles Babbage
built Colossus I
Charles Babbage
developed the Electronic Numerical Integrator and Computer
John Presper Eckert
was the first to successfully introduce a device exclusively designed for data processing
John Presper Eckert
developed the first modern digital computer with partner Clifford Berry
John Presper Eckert
designed an analytical engine that was ahead of the technology necessary to build it
John Presper Eckert
built Colossus I
John Presper Eckert
developed the Electronic Numerical Integrator and Computer
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Time bomb
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Time bomb
the final destination of discarded, lost, or destroyed data
Time bomb
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Time bomb
an individual hired by a company to test its security systems by attempting to violate them
Bit bucket
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Bit bucket
the final destination of discarded, lost, or destroyed data
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Bit bucket
an individual hired by a company to test its security systems by attempting to violate them
Sneaker
a term used to refer to humans operating computers (as opposed to hardware and software)
Sneaker
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Sneaker
the final destination of discarded, lost, or destroyed data
Sneaker
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Wetware
a term used to refer to humans operating computers (as opposed to hardware and software)
Wetware
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Wetware
the final destination of discarded, lost, or destroyed data
Wetware
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Wetware
an individual hired by a company to test its security systems by attempting to violate them
Brute force
a term used to refer to humans operating computers (as opposed to hardware and software)
Brute force
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Brute force
the final destination of discarded, lost, or destroyed data
Brute force
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Brute force
an individual hired by a company to test its security systems by attempting to violate them
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 62 flashcards in this deck.