This input device is used to click on items and navigate through programs on your computer.
What is a mouse?
Microsoft Word is an example of this type of software.
What is application software?
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system.
What is Malware?
The classroom number for this course.
What is HEC 0104?
This device connects different networks together and directs internet traffic between them.
What is a router?
This tool helps programmers track changes to code and collaborate.
What is version control (or Git)?
This is the program you use to access websites, like Chrome or Safari.
What is a web browser?
A collection of software tools used by a hacker to mask intrusion and obtain admin-level access to a computer or computer network.
What is Rootkit?
This instructor for COP 4910 holds a BS in Computer Science and an MS in Engineering from UCF.
What is Craig Loftin?
A type of computer memory that provides temporary storage for data that the computer is actively using.
What is RAM?
This is the practice of hosting and running software over the internet, rather than on a local computer.
What is cloud computing (or Software as a Service - SaaS)?
This is a hidden part of the internet that isn't indexed by search engines.
What is the deep web?
A type of virus that infects the storage drive area containing the necessary data and code used to start the OS.
What is Boot Sector Virus?
Storytelling format used to dissect our textbook chapters.
What is Story Spine?
This cooling technology uses a liquid instead of air to dissipate heat from computer components.
What is liquid cooling/water cooling?
This type of software testing simulates user behavior without knowledge of the codebase.
What is black-box testing?
This protocol is used to transfer web pages securely, and is signaled by a padlock in your browser.
What is HTTPS?
A type of attack aimed at exploiting a vulnerability present in already released software, but unknown to the software developer.
What is Zero-Day attack?
The story we analyzed during class at the beginning of the semester.
What is The Wizard of Oz?
This specialized graphics hardware technology enables real-time light ray simulation to create more realistic shadows, reflections, and illumination in 3D rendering.
What is ray tracing?
This secure software development practice involves integrating security checks and practices at every stage of the software development lifecycle.
What is DevSecOps (Development, Security, and Operations)?
This system turns domain names like "openai.com" into IP addresses that computers use.
What is DNS (Domain Name System)?
Entry fields of web forms lacking input validation are vulnerable to this kind of attack.
What is SQL injection attacks?
Professor Loftin’s wife's PhD major.
What is Chemistry?