Elliott_Brandon_W3Ch5-6Terms

docx

School

Upper Iowa University *

*We aren’t endorsed by this school

Course

102

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by SuperHumanWaspPerson1012

Report
NAME: _______Elliott Brandon _________ Score: _______ / 100 Use Office 365 Word for this assignment: This is available through your UIU Student email Account Note: If you need assistance in finding some of the Office 365 Word feature to complete this assignment a. Use Office 365 Word’s Help b. Use a search engine (like https://google.com or https://bing.com to perform and Internet search for “office 365 <Operation> tutorial” REPLACE <Operation> with the Word Operation you are looking for. i. Example: “office 365 smart graphic tutorial” c. Contact the Instructor for assistance. Deliverables: Once you have completed the Assignment 1. Save your work 2. Name the Word document with your_name_W3Ch5-6Terms a. Example: (Jane_Doe_W3Ch5-6Terms.docx) 3. Download the assignment from Office 365 4. Open and Check the File for accuracy 5. Upload the file to the Assignment’s dropbox. Chapter 5-6 Terms Questions: 1) 6pts What is the Primary Purpose of each of these Common Types of Malware? (What do the attackers expect the malware to do for them) o Virus: Negatively impacts a computer or mobile device by modifying its functionality without the user's awareness or consent. o Worm: Initiates the shutdown of the computer, device, or network. Consumes resources and occupies space by repeatedly replicating itself. o Rootkit: Enables remote individuals to gain complete control over the computer or device. o Trojan: Camouflages within or mimics a legitimate program. Unlike viruses or worms, a Trojan horse avoids self-replication to other devices; instead, users unwittingly download it onto their computers. o Spyware: G athers user information and discreetly transmits the collected data to an external entity while the user is actively online. o Adware: Presents an online advertisement through a banner, pop-up window, or pop-under window across web pages, email messages, or other internet services.
3pts Research online for the largest DOS or DDOS. Who did they attack? Provide the Reference using the word reference/bibliography tool The biggest DDoS attack to date took place in September of 2017. The attack targeted Google services and reached a size of 2.54 Tbps. References Cloudflare.com. (2021, June 06). What was the largest DDoS attack of all time? Retrieved from cloudflare.com: https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/ 2) 3pts Identify the Spoofing Mechanisms used (A, B, C) o Email A o Website C o IP B 3) 3pts List 3 steps you can use to avoid spoofing attacks? 1. Use antivirus software! 2. Always be suspicious and wary of email attachments. 3. Scan removable media for malware before using it. 4) 6pts How do each of these prevent Unauthorized Access and Use o Biometric: Verifies an individual's identity by converting a personal characteristic, like a fingerprint, into a digital code. This code is then compared with a stored digital code in a computer or mobile device, confirming a physical or behavioral trait. If the codes do not match, authentication fails. o Passwords: A confidential set of characters linked to a username, granting entry to specific computer resources. Incorrect input results in denied access.
o Two-factor Authentication: A computer or mobile device employs dual sequential methods to authenticate a user's identity. Success in the first method is insufficient; the individual must correctly navigate the subsequent verification step. 5) 2pts Patents apply to Intellectual Property. What is an example of Intellectual Property. Intellectual property includes creations like patents, trademarks, copyrights, and trade secrets. For instance, a patented invention or a unique company logo represents intellectual property. For example, the name “Apple” would be intellectual property. 6) 3pts What is a Copyright? Give an example of what it protects? Copyright safeguards original creative works, like books, music, or art. For example, a copyright protects a novel, ensuring exclusive rights to its reproduction and distribution. 7) 2pts Checkout these two sites for Information Accuracy. Are the Accurate? o The Onion - NO o Fox news - YES 8) 3pts Install or verify a antivirus software is running on your computer: (Provide an image of the virus scanners screens) o Computer 9) 3pts Setup automatic backups on your: (Provide an image of the backup configuration screens)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
o Phone o Computer 10) 5pts Give an example of a use of each of these: o File Encryption: Users can request email applications to securely encrypt messages before sending. Recipients must use their email application to decrypt the message for reading. o Public – Private Key Encryption: In encryption, public keys can be shared on secure webpages, public-key servers, or through email. Conversely, the private key should remain confidential. o Digital Signature: Frequently utilized to prevent impostors in online transactions, signatures for bank statements or packages serve as a verification measure. o Digital Certificate: E-commerce applications
o VPN: Establishes a secure connection for mobile users to the company's network server, simulating a private line for enhanced security. 11) 3pts What is Binary? How many bits are in a byte? Binary is a base-2 numeral system using 0s and 1s. A byte consists of 8 bits. 12) 2pts What text coding scheme is mainly used to represent your initials in Binary for the computer? The ASCII (American Standard Code for Information Interchange) coding scheme. 13) 3pts What is the difference between volatile and non-volatile memory. When the computer is powered off, volatile memory loses data, whereas nonvolatile memory retains its contents. 14) 4pts The motherboard has multiple busses that connect devices attached to circuit board, how does word size related to these busses? The word size, or the number of bits processed in a single instruction, can influence the efficiency of data transfer on the busses of a motherboard. Larger word sizes may enhance data transfer rates between devices connected to the circuit board. 15) 3pts What are the three main levels of cache Memory? Which is the slowest? The three main levels of cache memory are L1 (Level 1), L2 (Level 2), and L3 (Level 3). Among these, L3 cache is typically the slowest as it is larger but more distant from the CPU cores compared to L1 and L2 caches. 16) 2pts What is the difference between RAM and ROM? RAM (Random Access Memory) is volatile, used for temporary data storage. ROM (Read-Only Memory) is non-volatile, containing permanent data, such as firmware 17) 2pts What are the three main components of CPU The three main components of a CPU (Central Processing Unit) are the control unit, arithmetic logic unit (ALU), and registers. The control unit manages instructions, the ALU performs calculations, and registers store data. 18) 2pts Explain the Machine processing cycle? Fetch, Decode, Execute and Store Fetch: The CPU retrieves the next instruction from memory.
Decode: The instruction is decoded, determining the operation to be performed. Execute: The decoded instruction is executed, carrying out the specified operation. Store: The results of the execution are stored back in memory or registers for future use. 19) 2pts The Clockspeed of the CPU determines how fast a CPU processes. What represents 1 billion of these cycles? One billion cycles per second is represented by 1 gigahertz (GHz). 20) 2pts RAM memory can be static or dynamic, which is faster and more reliable? Static RAM (SRAM) is faster than Dynamic RAM (DRAM) and is often considered more reliable. However, SRAM is also more expensive and consumes more power compared to DRAM, which is why both types are used in different scenarios based on their characteristics. 21) 2pts Give an example of plug and play Keyboard and mouse 22) 2pts What does the power supply do? The power supply in a computer converts electrical power from an outlet into the necessary form for the computer components. It provides regulated power to the motherboard, CPU, storage devices, and other hardware components, enabling proper functioning of the computer system. 23) 2pts What is the advantage of a multi-core processor over a single core processor? A multi-core processor can handle multiple tasks simultaneously, improving overall performance and multitasking capabilities compared to a single-core processor. This enhances efficiency, responsiveness, and the ability to run resource-intensive applications concurrently, leading to better overall system performance. 24) 2pts What does the CMOS battery do? The CMOS battery on a computer motherboard provides power to the CMOS memory. This memory stores the system's settings, including the date and time. The CMOS battery ensures that these settings are retained even when the computer is powered off, preventing the need to reconfigure the system each time it is restarted. 25) 28pts Identify Each of these Computer Components o Optical Drive (DVD) - B o Network Interface Card (check the PORT) - L o Case FAN - D
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
o Speakers - N o CPU FAN and Heat Sink - E o Keyboard and Mouse - G o RAM Memory - H o CPU – C o Display - I o Harddrive – F o Power Supply – J o Case- A o Motherboard – K o Sound (Expansion) Card (check the PORT) – M 26) Save your work and Submit the Deliverables Go to top in the “Deliverables”Error: Reference source not found section for submission instructions.