|
|
Created by Victoria Heppinstall
over 8 years ago
|
|
| Question | Answer |
| Archive | A copy of a file kept away from the original and no longer in everyday use. |
| Backup | A copy of a file in case of accidental or malicious loss of the original. |
| Data | Raw facts and figures with no meaning. (eg. 011263) |
| Decryption | Data is unscrambled by software using a key so that the data can be understood. |
| Encription | Data is scrambled by software using a key so that the data cannot be understood by anyone viewing it. |
| Encryption/Decription key | A password or PIN used to scramble/unscramble data. |
| Firewall | Hardware or software security measure to control access to computer networks or systems, using rules set up by the user. |
| Hacking | Accessing an ICT system without use of proper usernames or passwords; illegal hacking is unauthorised access. |
| Information | Processed data put into context |
| Malware | Malicious software that enters a computer system without the owner's consent and which harms the system. |
| Password | A security measure to check the username is being used by the correct user. |
| Personal Data | Data that can be used to identify you or provide information about you and your activities. |
| PINs | Personal Identification Number: Four or more numbers used instead of a password. |
| Spyware | Malicious software that sends details of data and activities of a computer system to others without knowledge of the owner of the system. |
| Trojan horse | Malicious software that pretends to be a useful application but carries out other tasks. |
| Unauthorised User | Someone who does not have permission to access or see the data. |
| Username | This identifies a user to the ICT system so the system can allow them access. |
| Virus | Malicious software that can replicate itself and cause harm to files by deleting, altering or by corrupting them. |
| Worm | Malicious software that copies itself and uses networks to spread without a user helping them. |
| Adware | Software that automatically downloads and installs on a computer system, which then advertises or directs the user to advertising material. |
Want to create your own Flashcards for free with GoConqr? Learn more.