This is any software designed to harm, disrupt, or gain unauthorized access to a computer system.
What is malware?
This program detects, quarantines, and removes malware from your computer.
What is an antivirus program?
This law states that the number of transistors on a chip doubles roughly every 18 to 24 months, meaning computing speed doubles at the same rate
What is Moore's Law?
These are the five stages of building a system in order: planning, analysis, design, implementation, and maintenance.
What is SDLC?
This system processes business transactions at the operational level such as sales, payments, and orders.
What is a TPS?
This malware disguises itself as a legitimate program but carries a malicious payload underneath.
What is a Trojan?
This security tool monitors and controls incoming and outgoing network traffic to block unauthorized access from outside.
What is a firewall?
This is hiring another company to do part of your work to save money on labor, taxes, or components.
What is outsourcing?
This development approach puts developers, analysts, and users in the same room to fix problems as they go instead of waiting until the end.
What is JAD?
This system uses fuzzy logic to simulate the gut-feeling decision making process of a human expert
What is an Expert System?
This type of malware locks your files and demands payment to restore access.
What is ransomware?
This antivirus technique looks for suspicious behavior in programs rather than relying on known virus signatures.
What is heuristic analysis?
This is the analog portion of the phone network that runs from the telephone company directly to the customer and is not yet digitized.
What is the Last Mile?
This is the most common cause of project failure and involves adding new features or requirements after the project has already started.
What is feature creep?
This stands for Performance, Information, Economics, Control, Efficiency, and Service and describes the categories of problems a business could face in an information system.
What is PIECES?
This malware hides deep in a computer's operating system, gives attackers permanent unauthorized access, and conceals its own presence.
What is a rootkit virus?
This federal law protects the privacy of electronic communications and sets the rules for when the government can legally access them.
What is the Electronic Communications Privacy Act?
This refers to a new product or service that completely displaces an existing industry, often wiping out companies that did everything right
What is disruptive technology?
These are the four types of testing in order from first to last: testing your own work, testing against teammates, testing against other systems, and having users try to break it.
What is unit, integration, system, and acceptance testing?
This is the total number of information received not counting overhead, errors, or dropped packets.
What is throughput?
This is a network of infected computers controlled by a criminal and used to carry out large scale attacks like DDoS.
What is a botnet?
This law expanded government surveillance powers after September 11, 2001 and allowed broader monitoring of electronic communications.
What is the Patriot Act?
This is the act of reporting illegal or unethical behavior within an organization you are associated with, and is protected by law in certain circumstances.
What is whistleblowing?
This tool helps developers build systems by documenting requirements, diagramming systems, developing programs, and automatically flowing changes through all related code.
What is a CASE tool?
This is a specialized facility designed to hold and protect computer systems and data both physically and electronically. A version of it operates with no people and keeps the lights permanently off.
What is a data center?