Top-Rated Free Essay
Preview

NTM Review

Satisfactory Essays
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NTM Review
Secure Website/Network – HTTPS, and lock in address bar.
Added security

IP Address: Unique identifier on the Internet – Unique number attached to the Internet

Phishing – Emails or queries asking for personal information and can be related to identity theft.

Identity Theft – someone uses your information

Piggy Backing – Connect to someone else’s network without the owners consent.

Cookies - Information about your data and yourself
3rd party cookie – used for advertising

Biometric authentication – finger print or eye scan

Scare Ware – “Your computer is infected” – popup

Incognito feature on a browser – Google Chrome

Mac – security system is the IOS Gatekeeper

Mac – change system settings through “Preferences”

Approximate range for Bluetooth – Up to 30 feet.

Mobile device – virus is called mobile malware

Logical virus – Logic bomb – when logical conditions exist, for example at a certain date or time for virus to initiate.

Macro - Virus embedded in a Microsoft office document.

Worm - Self-replicating program.

Click jacking – Icon that you click on and it takes you somewhere else.

Important to run anti-virus software, delete history and cookies on a computer.

Know what could indicate a virus present on a computer.

Firewall – acts like a locked door on your computer.

Zombie – similar to a root kit – computer that is controlled by the hacker without the user’s knowledge.

Easiest way to get on your network is with a wireless network.

Wireless router security should be set at the best or the highest.

WPA2 – Security standard on a router.

Passwords – Use symbols, not personal information. Don’t use function keys. Symbols mix upper and lower case, numbers.

Social Media, LinkedIn, number one site for social media to get jobs.

Lion on LinkedIn – Linked In Open Networker.

Social media privileges can be revoked if you do something that you should not on the site.

Ask for LinkedIn recommendation from someone immediately after completing a project.

Maximize button on browser is the square.

RAM – Random Access Memory – memory storage on your computer.

Problem step recorder.

Screen recorder,

LAN – Local Area Network.

Ready Boot – Windows 7, 8, 8.1 – Can use storage space on a jump drive as RAM.

Professional picture on LinkedIn – shoulders and head.

Peripheral Device – Keyboard, mouse, printer. Anything that you plug into a computer. Speakers, microphone.

Speed – hertz. Gigahertz is faster than a megahertz.

Cloud storage – Cloud computing – Internet storage. Need Internet access.

Input peripheral – mouse, keyboard,

Output device – printer, monitor.

Computer box – system unit or CPU.

Wireless LAN – Wireless network.

Title bar – tells the name of a document.

Operating system - Windows or IOS – program that operates the computer, runs applications

URL – Visual representation of your IP Address. Uniform Resource Locator – www.weber.edu, only one page can have a URL. It cannot be shared.

Internet protocol – HTTPS

Domain – www.weber.edu - weber is the domain

You May Also Find These Documents Helpful