ict ecdl revision

HideShow resource information
  • Created by: Tiana
  • Created on: 14-01-14 12:28
What is Spam?
unwanted messages sent by malicious advertisers to infect your PC
1 of 30
Email
Email
2 of 30
Malicious programs
computer programs designed to affect your computer & stop it from working
3 of 30
Anti-spam software
prevents spam from reaching the inbox or deletes spam emails
4 of 30
Virus
a program designed to infect your computer
5 of 30
Damaged data
data that has been corrupted by viruses or malicious programs.
6 of 30
Worm
program designed to put load on a network. Sent through email to infected PCs
7 of 30
Trojan horse
performs an unexpected malicious action. i.e. erasing files etc.
8 of 30
Adware
program that automatically downloads ads. Usually harmless
9 of 30
Spyware
Installed secretly through the internet. Gathers personal information for advertisers.
10 of 30
Rogue diallers
makes unauthorised phone calls using the internet connection on your network.
11 of 30
Data transfer
downloading programs from the internet
12 of 30
Anti-virus software
prevents/removes viruses
13 of 30
Disinfecting
process of cleaning viruses from a PC
14 of 30
Anti-spyware software
blocks any threats it comes across
15 of 30
Authentication
establishing a User’s identity
16 of 30
Backup
copy of data
17 of 30
Encrypt
makes the data unreadable to anyone but the author or anyone who has access to the passwords
18 of 30
Hacker
someone who illegally gains access and tampers with the information on a PC
19 of 30
Operating system
management of the computer i.e. ‘Windows 7’
20 of 30
PDA
personal digital assistant, stores information such as addresses and phone numbers
21 of 30
Phishing
when phishers pretend to be organisations such as banks in order to trick you in giving out personal info.
22 of 30
Systems administrator
an IT member who operates a computer system or network.
23 of 30
Strong password
one that is difficult to guess and uses a variety of odd patterns and numbers
24 of 30
Software incompatibility
software systems that cannot operate together on the same computer.
25 of 30
Server
provides shared resources such as email, databases and printers.
26 of 30
Smartphones
a mobile phone offering advanced computer-like capabilities. i.e internet access and a built in keyboard
27 of 30
Unsecured network
can be accessed by anyone without any permission
28 of 30
USB flashdrive
portable data storage device that is one of the lightest ways of transfering and storing data
29 of 30
Wireless network
linking all of the computers at home or work withoout cables and letting them share an internet connection. AKA 'wi-fi'
30 of 30

Other cards in this set

Card 2

Front

Email

Back

Email

Card 3

Front

computer programs designed to affect your computer & stop it from working

Back

Preview of the back of card 3

Card 4

Front

prevents spam from reaching the inbox or deletes spam emails

Back

Preview of the back of card 4

Card 5

Front

a program designed to infect your computer

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all ICT ECDL resources »