MIS2223 week of Feb. 15 notes
MIS2223 week of Feb. 15 notes MIS 2223
Popular in Intoduction to computers
Popular in Business, management
This 3 page Class Notes was uploaded by Autumn Hubbard on Wednesday February 17, 2016. The Class Notes belongs to MIS 2223 at East Carolina University taught by Charles Justice in Winter 2016. Since its upload, it has received 21 views. For similar materials see Intoduction to computers in Business, management at East Carolina University.
Reviews for MIS2223 week of Feb. 15 notes
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/17/16
MIS 2223 February 15 Monday’s Notes Internet and Network Attacks Malware any kind of malicious software that does thing to your computer with out you wanting it to be on there. (was on the last test so I could imagine it will be on this one as well) Virus potentially dangerous program that is out on your computer Worm A program that replicates itself and copies, it can also jump to other computers on the network Trojan Horse A program that looks like it could be helpful (like a gift), it looks like it’s one thing but there is actually a virus in it! Rootkit A program that allows another person to take control of your computer Spyware A program that allows some Adware A program where the banners pop up and you can’t get rid of them Other Key terms Botnet if your computer get one, it will be considered a zombie. Its when a virus is sent to thousands of computers and then the network will be shut down Denial of service attack (DoS attack) disrupts computer access to an internet program Back door when someone writes a program but leaves somewhere to get in by other people that allows people to bypass security Spoofing a technique Firewall Helps keep notice of what’s going on your computer Unauthorized Access vs Unauthorized Use Access using a computer or network without permission Use using your computer doing un approved work or illegal activities Access Controls are username and password. A passphrase is a private combination of words and numbers. A possessed object is anything you can carry to access something Biometric device can be a fingerprint reader, facial recognition, voice verification, or signature. Digital Forensics = digital evidence. Used by law enforcement, insurance agencies, etc. Software theft stealing media, erasing programs, illegally downloading copyrighted material, illegally copying a program, or taking software and using it in other places Product activation Software theft continued License agreement will be on the test! EULA END USER LICENSE AGREEMENT Basically when you agree to the terms and agreements. It informs you of what you can do with the software and how many computers you can put it on. Tells you what you can and can’t do! Information theft when some steals your personal information Encryption is swapping of letters and numbers and if you don’t have the specific code then it will not work. It protects the message. Wednesday Notes Chapter 9 Operating Systems What is an operating system? Some examples are iOS or Mac OS. Video: The history of the operating System An operating system starts and stops your computer. It runs a bunch of programs. It gives you a user interface (what’s that?), its what you see on the screen. An operating system manages your programs, memory, devices, and different tasks. The operating system is the heart of your computer! Sleep Mode it puts your computer in a very low state Hibernate it takes a picture of your open tasks and shuts off the computer Warm Boot that’s like restarting the computer Cold boot that’s when you shut it down, leave it off for 2030 seconds and then re boot it back up. The cold boot is better when dealing with problems. GUI (pronounced gooey) when talking about user interface, a GUI is how you interact with your computer AN operating system tells your computer how to use multiple tasks Foreground Your main task Background what you’re not using at the time Single user or Multiuser different people could use a computer and have their personalized info Virtual Memory a portion of the storage in you computer Driver a small program that is stored on your computer that tells it how to communicate with other devices. Plug and play computers automatically install things that you plug in Performance Monitor PC CtrlAltDel; Mac Activity Monitor Operating systems also notify you when there is an update to be made. Different kinds of OS: Desktop Windows, OS X Server Mobile Then we watched a video: Microsoft vs Apple: The evolution of Oss (very cool video) Desktop Oss UNIX and Linux Chrome OS mostly web apps That was it for this week! No class on Friday!!
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'