| ______ software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms. |
| |
| A ______ allows remote hackers to download and execute files on your computer, upload a list of other infected computers, and use your computer as a relay station for breaking into other computers. |
| |
| a copy of one or more files that has been made in case the original files become damaged |
| |
| Virus experts use the term ______ threat to describe threats that combine more than one type of malicious program. |
| |
| Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent or ______ since the software’s behavior mimics a robot. They have become the biggest threat because they can form ___nets that can launch widescale Denial of Service attacks and distribute mountains of spam. |
| |
| technical jargon for a region of memory that holds data waiting to be transferred from one device to another |
| |
| this type of interface requires users to type memorized commands to run programs and accomplished tasks |
| |
| ______ software is typically sold in computer stores or at Web sites. |
| |
| a form of legal protection that grants the author of an original “work” an exclusive right to copy, distribute, sell, and modify that work |
| |
| A ______ ___ ______ attack is designed to generate a lot of activity on a network by flooding its servers with useless traffic that is enough to overwhelm the server’s processing capability and essentially bring all communications to a halt. |
| |
| this license agreement is displayed on-screen when you first install software |
| |
| ______ is copyrighted software that is available for free. |
| |
| this type of interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen [acronym] |
| |
| a person who uses a computer to gain unauthorized access to data, steal information, distribute viruses, or crash systems |
| |
| the core part of the operating system |
| |
| Trojan horses are notorious for stealing passwords using a ______, which is a type of program that records your keystrokes. |
| |
| a Unix-like computer operating system assembled under the model of free and open source software development and distribution |
| |
| GUI-based operating system developed by Apple, Inc. |
| |
| refers to any program or set of program instructions designed to surreptitiously enter a computer and disrupt its normal operations |
| |
| A ______ ______ worm spreads by sending itself to every address in the address book of an infected computer. It often includes an attachment that contains the worm. |
| |
| GUI-based operating system developed by Microsoft Corporation |
| |
| ______ ______software makes the uncompiled program instructions (source code) available to programmers who want to modify and improve the software. |
| |
| A software ______ is a small section of program code that replaces part of the software you currently have installed. |
| |
| In addition to replicating itself, a virus might deliver a ______, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk. |
| |
| ______ ______ software is available for public use without restriction except that it cannot be copyrighted. |
| |
| Malicious programs called ______ viruses are designed to attack antivirus software by deleting the files that contain virus descriptions or corrupting the main executable virus-scanning program. |
| |
| a set of patches that correct problems and address security vulnerabilities [two words] |
| |
| ______ is copyrighted software marketed under a “try before you buy” policy (free trial). |
| |
| A virus ______ is a section of program code that can be used to identify a known malicious program. |
| |
| Hackers have become proficient at using “______ engineering” techniques to make e-mail messages and their attachments seem legitimate. |
| |
| a legal contract that defines the ways in which you may use a computer program |
| |
| Mass-mailing worms are difficult to track because the “From” line of the infected message contains a ______ address of a randomly selected person with a valid address from the address book rather than the address of the computer that actually sent the mail. |
| |
| a computer program that seems to perform one function while actually doing something else |
| |
| a multitasking, multi-user computer operating system originally developed in assembly language in 1969 by a group of AT&T employees at Bell Labs |
| |
| refers to files that have been uncompressed or reconstituted into the original collection of files |
| |
| the combination of hardware and software that helps people and computers communicate with each other |
| |
| A computer ______ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files. |
| |
| Unlike a virus, which is designed to spread from file to file, a ______ is designed to spread from computer to computer. Most of them take advantage of communications networks (mainly the Internet). |
| |
| refers to one or more files that have been compressed to decrease size and reduce download time |
| |