Computing Hardwarer

HideShow resource information
What examines the traffic between user's computer and public network?
Firewall
1 of 12
True Or False. Hiding your personal information keeps you completely safe from an attack?
False
2 of 12
Which type of person poses the greatest threat to an organisation's security?
Disgruntled employee
3 of 12
What is a type of attack that sends enough requests to overload a resource or even stopping its operation?
Denial Of Service (DoS)
4 of 12
What is the common technique for scrambling messages sent between users?
Encryption
5 of 12
How Does Huffman Encoding work?
Huffman encoding is a compression technique that is used to reduce the number of bits required to store each letter. The more frequently a letter appears in the text, the fewer bits are used to represent it.
6 of 12
What is Encryption?
Encoding data being transferred to prevent a third party from intercepting the data.
7 of 12
What is ROM?
Read Only memory. Non Volatile. Contains the boot.
8 of 12
What is the Bootstrap loader?
A small program that is used to load the OS.
9 of 12
What is RAM?
Random Access Memory. Used to store software and programs in use as well as the operating system.
10 of 12
What is Virtual Memory?
A small part of the hard drive used as an extension to RAM.
11 of 12
What is cloud storage?
Cloud Storage refers to saving data in an offsite storage system maintained by a third party.
12 of 12

Other cards in this set

Card 2

Front

True Or False. Hiding your personal information keeps you completely safe from an attack?

Back

False

Card 3

Front

Which type of person poses the greatest threat to an organisation's security?

Back

Preview of the front of card 3

Card 4

Front

What is a type of attack that sends enough requests to overload a resource or even stopping its operation?

Back

Preview of the front of card 4

Card 5

Front

What is the common technique for scrambling messages sent between users?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Computer systems resources »