Christopher Alvarado

From GGCWiki
Jump to: navigation, search

Contents

christopher alvarado

  • Major: is criminal jusitce

information

  • phone number:4047594570
  • E-mail: chrisalvaradooo@gmail.com
  • School: Georgia Gwinnett college

JOBS

  • Moes
  • Mr.clean carwash

Link

Andrea Diazinternal link [1]

picture

374489 10202567147730756 2094689418 n.jpg


keywords chapter 1

  • Computer literacy: familiarity with computers and how they work, especially a nontechnical understanding of microcomputers and of the role computers play in modern society.
  • Data mining: the process of collecting, searching through, and analyzing a large amount of data in a database, as to discover patterns or relationships: the use of data mining to detect fraud.
  • Bluetooth: a brand name for a wireless networking technology that uses short-wave radio frequencies to interconnect cell phones, portable computers, and other wireless electronic devices.
  • RFID: radio frequency identification: a technology that uses electronic tags placed on objects, people, or animals to relay identifying information to an electronic reader by means of radio waves
  • Nanotechnology: a technology executed on the scale of less than 100 nanometers, the goal of which is to control individual atoms and molecules, especially to create computer chips and other microscopic devices.
  • Nanoscience: the study of the performance of ultra-small structures, materials, and devices, usu. usually 0.1 to 100 nm; also, the study of manipulating materials on an atomic or molecular scale
  • Patient Simulator:
  • PDA: personal digital assistant.
  • Digital Divide: the socioeconomic and other disparities between those people who have opportunities and skills enabling them to benefit from digital resources, especially the Internet, and those who do not have these opportunities or skills
  • Software: Computers. the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them. Compare hardware
  • Spam: disruptive messages, especially commercial messages posted on a computer network or sent as e-mail.
  • QR code: a technology that lets any piece of print in the real worldhost a live link to online information and video content
  • Swiftriver: a free and open source intelligence platfroms that helps people create and make scene of large amounts of informtation in a short amount of time
  • Data mining: the process by which great amounts of data are analyzed and investigated
  • Collaborative consumption: join together as a group to use a specific product more efficiently

Binary code

  • I Appreciate me
  • 01001001
  • 00100000
  • 01000001
  • 01010000
  • 01010000
  • 01010010
  • 01000101
  • 01000011
  • 01001001
  • 01000001
  • 01010100
  • 01000101
  • 01001101
  • 01000101

Chapters definition

Bryce Martin Christopher Alvarado Chapter 2 DeVante' Roberts Ivan Bessah Christopher Alvarado Chapter 3

Chapter 4 Key Terms

  • Application software: Application software is all the computer software that causes a computer to perform useful tasks beyond the running of the computer itself
  • Computer-aided design (CAD):CAD is mainly used for detailed engineering of 3D models and/or 2D drawings of physical components, but it is also used throughout the engineering process from conceptual design and layout of products, through strength and dynamic analysis of assemblies to definition of manufacturing methods of components.
  • Database software: is the phrase used to describe any software that is designed for creating databases and managing the information stored in them.
  • Desktop publishing software (DTP):is the creation of documents using page layout skills on a personal computer. Desktop publishing software can generate layouts and produce typographic quality text and images comparable to traditional typography and printing
  • Digital video editing software:is application software which handles the post-production video editing of digital video sequences on a computer non-linear editing system
  • Drawing/Illustration software:numerical analysis showing the benefits of the concept, customized to your client’s situation
  • Freeware:software that is available free of charge.
  • Image/Photo editing software:In computer graphics, graphics software or image editing software is a program or collection of programs that enable a person to manipulate visual images on a computer.
  • intergrated help:A popular computer buzzword that refers to two or more components merged together into a single system
  • Multimedia software:are computer applications which can process information. The information can be processed in a number of media formats including text, graphics, audio and video
  • Open source software:is software whose source code is available for modification or enhancement by anyone
  • Productivity software:is one of the reasons people use computers. Productivity software help the professional or common user to enhance and complete their tasks
  • Shareware:software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
  • Software:the programs and other operating information used by a computer.
  • Software suite:usually application software or programming software— of related functionality, often sharing a more-or-less common user interface and some ability to smoothly exchange data with each other.
  • Spreadsheet software:A type of application program which manipulates numerical and string data in rows and columns of cells. The value in a cell can be calculated from a formula which can involve other cells.
  • System software:is computer software designed to operate and control the computer hardware and to provide a platform for running application software
  • Web-based application software:refers to any program that is accessed over a network connection using HTTP, rather than existing within a device’s memory. Web-based applications often run inside a Web browser
  • Web page authoring software:A category of software that enables the user to develop a Web site in a desktop publishing format.
  • Word processing software:is a term that means using a computer to create, edit, and print documents

chapter 5 key terms

  • Application programming interface (API):a system of tools and resources in an operating system, enabling developers to create software applications
  • Application software:systems software and applications software. Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets.
  • backup and restore utility:
  • Basic input/output system (BIOS):a set of computer instructions in firmware that control input and output operations.
  • Boot process:The term boot is used to describe the process taken by the computer when turned on that loads the operating system and prepares the system for use.
  • Command-driven interface:
  • Desktop:the working surface of a desk
  • Device driver:is a computer program that operates or controls a particular type of device that is attached to a computer.
  • Device manager:is a Control Panel applet in Microsoft Windows operating systems
  • Disk cleanup:is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive.
  • Disk defragmenter:is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
  • Error-checking:In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels
  • Extension:a length of electric cord that permits the use of an appliance at some distance from a fixed socket.
  • File allocation table (FAT):the part of a floppy disk or hard disk where information is stored about the location of each piece of information on the disk (and about the location of unusable areas of the disk)
  • File compression utility:A utility program, such as PKZIP, StuffIt or DriveSpace, that compresses and decompresses infrequently used files so that they take up to 40 to 90 percent less rooom on a hard disk. You use another utilit to decompress a file.
  • File management:A file manager or file browser is a computer program that provides a user interface to work with file systems.
  • File path:A path, the general form of the name of a file or directory, specifies a unique location in a file system
  • Firmware:permanent software programmed into a read-only memory.
  • Graphical user interface (GUI):a visual way of interacting with a computer using items such as windows, icons, and menus, used by most modern operating systems.
  • Icon:a person or thing regarded as a representative symbol of something
  • Interrupt:stop the continuous progress of (an activity or process).
  • Interrupt handler:is a low-level counterpart of event handlers. These handlers are initiated by either hardware interrupts or interrupt instructions in software, and are used for servicing hardware devices and transitions between protected modes of operation such as system calls.
  • Kernel:is a program that constitutes the central core of a computer operating system. It has complete control over everything that occurs in the system
  • Last known good configuration:a copy of a system's hardware configuration and driver settings
  • Library:A collection of files.
  • linux:an open-source operating system modelled on UNIX.
  • Mainframe:the central processing unit and primary memory of a computer.
  • Menu-driven interface:An interface is a set of commands or menus through which a user communicates with a program
  • MS-DOS:Microsoft disk operating system
  • multitasking:the simultaneous execution of more than one program or task by a single computer processor
  • Multiuser/Network operating system:Network Operating System refers to software that implements an operating system of some kind that is oriented to computer networking.
  • Operating system:the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
  • Paging:A technique used by virtual memory operating systems to help ensure that the data you need is available as quickly as possible
  • Platform:The underlying hardware or software for a system. The platform defines a standard around which a system can be developed.
  • Plug and play (PnP):a standard for the connection of peripherals to personal computers, whereby a device only needs to be connected to a computer in order to be configured to work perfectly, without any action by the user
  • Power-on self test (POST):A sequence of diagnostic tests that are run automatically by a device when the power is turned on. - checks that the diskette drive, hard disk drive, CD-ROM drive, and any other drives that may be installed are working.
  • Preemptive multitasking:The ability to execute more than one task at the same time, a task being a program. The terms multitasking and multiprocessing are often used interchangeably, although multiprocessing implies that more than one CPU is involved.
  • Real-time operating system (RTOS):is an operating system that guarantees a certain capability within a specified time constraint. For example, an operating system might be designed to ensure that a certain object was available for a robot on an assembly line.
  • Recycle bin: a simulated garbage can used for deleting files and folders.
  • Restore point:is a representation of a stored state of your computer's system files. You can use a restore point to restore your computer's system files to an earlier point in time.
  • Ribbon:A flat, thin cable containing many parallel wires. Because of their shape, ribbon cables are ideal for situations where space needs to be conserved.
  • Root directory:The top directory in a file system. The root directory is provided by the operating system and has a special name; for example, in DOS systems the root directory is called \.
  • Safe mode: is a way to find out what the problem is. In safe mode, the only startup programs that are loaded are the operating system and drivers for the mouse, keyboard and standard VGA display modes.
  • Sector:The smallest unit that can be accessed on a disk. When a disk undergoes a low-level format, it is divided into tracks and sectors.
  • Server:a computer or computer program that manages access to a centralized resource or service in a network.
  • Single-user, multitasking operating system: allows more than one program to be running at the same time
  • Single-user single task operating system: is designed to manage the computer so that one user can effectively do one thing at a time.
  • Source code:a text listing of commands to be compiled or assembled into an executable computer program.
  • Spooler:a program that sequences printing jobs by temporarily storing data in a buffer and processing the jobs sequentially.
  • Swap/Page file:he page file is one of those pieces of the operating system that administrators know that they need to have - but they can't always explain why they need it, or how to accurately size it.
  • System files: A system for organizing directories and files, generally in terms of how it is implemented in the disk operating system. E.g., "The Macintosh file system is just dandy as long as you don't have to interface it with any other file systems".
  • System restore:System Restore is a feature first introduced in Windows XP. It allows users to restore their computers to a previous state without losing personal data files. System Restore automatically creates restore points, which you can use to revert your system to the way it was at a previous time.
  • System software:System software is a type of computer program that is designed to run a computer's hardware and application programs.
  • Task manager utility:A task manager is a system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. Some implementations can also be used to terminate processes and programs, as well as change the processes priority.
  • Task scheduler utility: is a component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at pre-defined times or after specified time intervals
  • Thrashing:In systems that use virtual memory, the resulting condition of a hard drive being used excessively for virtual memory
  • Toolbar:A series of selectable buttons in a GUI that give the user an easy way to select desktop, application or Web browser functions.
  • Track:A ring on a disk where data can be written. A typical floppy disk has 80 (double-density) or 160 (high-density) tracks.
  • UNIX:a popular multi-user, multitasking operating system
  • User interface:A boundary across which two independent systems meet and act on or communicate with each other. In computer technology, there are several types of interfaces
  • Utility program:a program for carrying out a routine function.
  • Virtual memory:An imaginary memory area supported by some operating systems (for example, Windows but not DOS) in conjunction with the hardware. You can think of virtual memory as an alternate set of memory addresses.
  • Windows Explorer:A Web browser that made its debut in 1995 as Microsoft's response to Netscape, one of the first graphical-based Web browsers and, at the time, the dominant browser in use with control of over 90 percent of the market.

Chapter 9 definition

  • Adware:software that automatically displays or downloads advertising material (often unwanted) when a user is online
  • Antivirus software: Programs to detect and remove computer viruses. The simplest kind scans executable files and boot blocks for a list of known viruses. Others are constantly active, attempting to detect the actions of general classes of viruses.
  • Backdoor program:An alternative method used to access a computer or computer data over a network.
  • Backup:the procedure for making extra copies of data in case the original is lost or damaged.
  • Biometric authentication device:A device that uses some unique characteristic of human biology to identify authorized users.
  • Black hat hacker:is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security.
  • Boot-sector virus:infected the hard disk when a user inadvertently left an infected floppy disk in drive A. When the PC was next booted, the system would try to boot from the floppy disk and the virus code would execute, regardless of whether or not the floppy disk was a system disk or just a data disk.
  • Botnet:a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
  • Cookie:a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
  • Cybercrime:crime conducted via the Internet or some other computer network
  • Cybercriminal:hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • Cyber-loafing:Slang term used to describe employees who surf the net, write e-mail or other Internet-elated activities at work that are not related to their job.
  • Data file:A data file is a computer file which stores data to use by a computer application or system.
  • Denial of Service (DoS) attack: is an attempt to make a machine or network resource unavailable to its intended users.
  • Distributed Denial of Service attack (DDoS) attack: is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
  • Drive-by download: A program that is automatically installed in your computer by merely visiting a Web site, without having to explicitly click on a link on the page.
  • Dynamic addressing:A dynamic IP address is an IP address that is assigned automatically by the system to a device, account or user when it is connected to the network; that is, it is assigned as needed rather than in advance.
  • E-mail virus:A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected"
  • Encryption virus:An encrypted virus' code begins with a decryption algorithm and continues with scrambled or encrypted code for the remainder of the virus. Each time it infects, it automatically encodes itself differently, so its code is never the same.
  • Firewall:a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  • Hacker:a person who uses computers to gain unauthorized access to data
  • Hoax:a humorous or malicious deception
  • Identity theft:he fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  • Image backup:The rootvg is stored on a hard disk, or group of disks, and contains start up files, the BOS, configuration information, and any optional software products.
  • Incremental backup:a security copy that contains only those files that have been altered since the last full backup.
  • Inoculation:the action of inoculating or of being inoculated; vaccination.
  • IP address:a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  • Keystroke logger:often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
  • Logic bomb:a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
  • Logical port:Port specifically defined by a name (such as COM1, COM2, etc.) without a strictly defined physical port.
  • Logical port blocking:It is a number used in a certain format simply to let network aware applications
  • Macro virus: is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it.
  • Malware:software that is intended to damage or disable computers and computer systems
  • Master boot record: is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.
  • Multipartite virus: is a computer virus that infects and spreads in multiple ways. The term was coined to describe the first viruses that included DOS executable files and PC BIOS boot sector virus code, where both parts are viral themselves.
  • Network address translation: is a methodology of modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device for the purpose of remapping one IP address space into another.
  • Packet:is one unit of binary data capable of being routed through a computer network.
  • Packet filtering:operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply.
  • Packet sniffer:a sniffer program that targets packets of data transmitted over the Internet.
  • Personal firewall:is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.
  • Pharming:is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."
  • Phishing:the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  • Polymorphic virus:A virus that changes its virus signature (i.e., its binary pattern) every time it replicates and infects a new file in order to keep from being detected by an antivirus program.
  • Pretexting:is a form of social engineering in which an individual lies to obtain privileged data. A pretext is a false motive. Pretexting often involves a scam where the liar pretends to need information in order to confirm the identity of the person he is talking to.
  • Program file:Program Files is the directory name of a standard folder in Microsoft Windows operating systems in which applications that are not part of the operating system are conventionally installed.
  • Quarantining:impose isolation on (a person, animal, or place); put in quarantine
  • Script:an automated series of instructions carried out in a specific order.:
  • Social engineering:the application of sociological principles to specific social problems.
  • Spam:even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited.
  • Spam filter:A software routine that deletes incoming spam or diverts it to a "junk" mailbox (see spam folder). Also called "spam blockers," spam filters are built into a user's e-mail program.
  • Spyware:software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  • Static addressing:In some cases, a network administrator may implement dynamically assigned static IP addresses. In this case, a DHCP server is used, but it is specifically configured to always assign the same IP address to a particular computer
  • Stealth virus:In computer security, a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
  • Surge protector:A surge protector (or surge suppressor) is an appliance designed to protect electrical devices from voltage spikes. A surge protector attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.
  • Time bomb:Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed.
  • Trojan horse:a hollow wooden statue of a horse in which the Greeks concealed themselves in order to enter Troy.
  • Uninterruptable power supply (UPS):An uninterruptible power supply (UPS) is a device that allows your computer to keep running for at least a short time when the primary power source is lost. It also provides protection from power surges.
  • Urban legend:a humorous or horrific story or piece of information circulated as though true, especially one purporting to involve someone vaguely related or known to the teller.
  • Virus:an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host
  • Virus signature:The binary pattern of the machine code of a particular virus. Antivirus programs compare their database of virus signatures with the files on the hard disk and removable media (including the boot sectors of the disks) as well as within RAM.
  • White hat hacker:While white hat hacking is a hobby for some, others provide their services for a fee. Thus, a white hat hacker may work as a consultant or be a permanent employee on a company's payroll. A good many white hat hackers are former black hat hackers.
  • Whole-house surge protector:
  • Worm: A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Also see virus.
  • Zombie:computers are computers that have been taken over by a hacker without the knowledge of the owner. See more computer pictures. Related Links. Imagine that the Internet is a city.
Personal tools