1,237
11
Essay, 2 pages (450 words)

Computers 5.1

acceptable use policyoutlines the activities for which a computer and network may and may not be used

access controla security measure that defines who can access a computer, device, or network when they can access it, and what actions they can take while accessing it

adwarea program that displays an online advertisement in a banner or pop-up window an webpages, e-mail, or other internet services

audit trailelectronic file that records both successful and unsuccessful access attempts

back doora program or set of instructions in a program that allows users to bypass security controls when accessing a program computer or network

backupa duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed

biometric devicedevice that authenticates a person’s identity by translating a personal characteristic into a digital code

biometric paymentpayment method where the customer’s finger print is read by a finger print reader that is linked to a payment method

bota program that performs a repetitive task on a network

botneta group of compromised computers or mobile devices connected to a network that are used to attack other networks

browsing historya list of all websites you have visited over a period of time

business software alliancealliance formed by major worldwide software companies to promote understanding of software piracy

CAPTCHAa program that displays an image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs

CERT/CCa federally funded internet security research and development center

certificate authorityonline providers that issue digital certificates

childterm used in three generation backups to refer to the most recent copy of the file

cipher textencrypted (scrambled) data

click jackingscam in which an object that can be clicked on a website such as a button or link contains a malicious program

cloud backupbackup method in which files are backed up to the cloud as they change

code of conducta written guideline that helps determine whether a specific action is ethical/unethical or allowed/un-allowed

computer crimeany illegal act involving the use of a computer or related devices

computer emergency response team coordination centera federally funded internet security research and development center

computer ethicsthe moral guidelines that govern the use of computers, mobile devices, and information systems

content filteringthe process of restricting access to certain material

continuous data protectionbackup method in which all data is backup whenever a change is made

cookiea small text file that a webserver stores on your computer

copyrightexclusive rights given to authors artists and other creators of original work to duplicate, publish and sell their materials

ONCOMPUTERS 5. 1 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • Data Protection

Thank's for Your Vote!
Computers 5.1. Page 1
Computers 5.1. Page 2
Computers 5.1. Page 3
Computers 5.1. Page 4

This work, titled "Computers 5.1" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Computers 5.1'. 4 January.

Reference

AssignBuster. (2022, January 4). Computers 5.1. Retrieved from https://assignbuster.com/computers-51/

References

AssignBuster. 2022. "Computers 5.1." January 4, 2022. https://assignbuster.com/computers-51/.

1. AssignBuster. "Computers 5.1." January 4, 2022. https://assignbuster.com/computers-51/.


Bibliography


AssignBuster. "Computers 5.1." January 4, 2022. https://assignbuster.com/computers-51/.

Work Cited

"Computers 5.1." AssignBuster, 4 Jan. 2022, assignbuster.com/computers-51/.

Get in Touch

Please, let us know if you have any ideas on improving Computers 5.1, or our service. We will be happy to hear what you think: [email protected]