Search Header Logo
Chapter 10 Vocabulary  CST  IT Fundamentals

Chapter 10 Vocabulary CST IT Fundamentals

Assessment

Presentation

Science

12th Grade

Medium

NGSS
MS-PS4-3, MS-ETS1-1, MS-ETS1-2

+3

Standards-aligned

Created by

Marina Brzostoski

Used 4+ times

FREE Resource

11 Slides • 15 Questions

1

malicious

and software

MAL=bad(Greek)​

​Some text here about the topic of discussion.

Malware is a blend of

media

2

Malware is software designed to infiltrate or damage a computer system without the owner's consent or knowledge.

Some text here about the topic of discussion

media

3

Poll

Question image

Malware is software designed to_______ a computer system

invade

creep into

improve

4

Multiple Choice

Malware

1

A scheme for classifying information based on different levels of public/private distinctions.

2

Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.

5

Some text here about the topic of discussion.

Crypt=hidden ( Greek)

media

6

Fill in the Blanks

media image

Type answer...

7

Multiple Select

Question image

Encryption means:

1

To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

2

en=in

crypt=secret

ion=noun suffix

3

to put into code

4

Data Center

5

8

Match

Question image

Match the following

Encrypt

decrypt

cryptocurrency

cryptography

crypto-

To put into code

decode- to convert from code into plaintext.

alternative form of payment created using encryption algorithms

Secret writing

secret

9

media

​Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user.

Some text here about the topic of discussion.

AUTHENTICATION

10

Multiple Choice

Authentication that requires two or more evidences of authentication, usually of different types.

1

Authorization

2

Multi-Factor Authentication

3

Logging

4

Disaster Recovery

11

that the services it provides are no longer available to legitimate network clients.

legitimate( by law)

An attack that attempts to overload a system so

overload ( over=too much)

​Denial of Service

Some text here about the topic of discussion

12

Fill in the Blanks

Type answer...

13

The capturing and storing of computer and user events.

storing ( keeping track of)

​Logging

Some text here about the topic of discussion

media

14

Fill in the Blanks

media image

Type answer...

15

​Public/Private Classification

Distinctions=differneces

A scheme for classifying information based on different levels of public/private distinctions.

Some text here about the topic of discussion

media

16

Multiple Choice

A scheme for classifying information based on different levels of public/private distinctions.

1

Malware

2

Data Encryption

3

​Public/Private Classification

4

Disaster Recovery

17

​Business Continuity

Continue- ongoing

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.

Some text here about the topic of discussion

18

Multiple Choice

Business Continuity

1

ongoing prevention and recovery

2

encoding data

3

a copy of a file

4

the process of creating systems

19

Disaster Recovery

induced- made

An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.

Some text here about the topic of discussion

media

20

Fill in the Blanks

Type answer...

21

​Backup File

Corrupted-wronged

A copy of a file that can be used when the original file has been lost or corrupted.

Some text here about the topic of discussion

media

22

Open Ended

Question image

A copy of a file that can be used when the original file has been ____ __ _________.

23

An area used to store and share such things as computer systems, applications, data, and other components such as switches and routers. .

Some text here about the topic of discussion.

Data Center

media

24

Open Ended

Data Center is an area used to store and share .......

25

Match

Match the following

An attack when services are no longer available to legitimate network clients.

Software to infiltrate or damage a computer system without the owner's knowledge.

The capturing and storing of computer and user events.

Authentication that requires two or more evidences of authentication, usually of different types.

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

denial of service

Malware

logging

Multi-Factor Authentication

Data Encryption

26

Match

Match the following

A scheme for classifying information based on different levels of public/private distinctions.

An area used to store and share such things as computer systems, applications, data, and other components such as switches and routers.

A copy of a file which can be used when the original file has been lost or corrupted. 

An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.

 Public/Private Classification

Data Center

Backup File

 Disaster Recovery

Business Continuity

malicious

and software

MAL=bad(Greek)​

​Some text here about the topic of discussion.

Malware is a blend of

media

Show answer

Auto Play

Slide 1 / 26

SLIDE