Computer Science

HideShow resource information
Name a key method to identify a phishing email?
Spelling Mistakes
1 of 13
What is a DDoS
Denial Distribution Of Service
2 of 13
What is SQL injection?
A computer attack where malicious code is embedded.
3 of 13
What does a firewall protect you from?
Viruses
4 of 13
What is Malware?
Software designed to retrieve or disrupt information from a computer.
5 of 13
What is the typical Max Bandwidth of a copper cable?
1 Gigabyte Per Second
6 of 13
What is a LAN?
Local Area Network
7 of 13
What is a disadvantage of wireless networks?
Low Bandwidth
8 of 13
What does an individual computer need to connect to a network?
Network Interface Controller
9 of 13
What is the function of a router?
Forwards data traffic between computer networks.
10 of 13
Why should data be stored in a clear structured form?
Easy to understand and mistakes easily spotted.
11 of 13
What is an Array?
Ordered information that is referenced
12 of 13
What is a variable?
Structures with data that can change.
13 of 13

Other cards in this set

Card 2

Front

What is a DDoS

Back

Denial Distribution Of Service

Card 3

Front

What is SQL injection?

Back

Preview of the front of card 3

Card 4

Front

What does a firewall protect you from?

Back

Preview of the front of card 4

Card 5

Front

What is Malware?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all System Security resources »