DCM Vocabulary
Across
- 2. the cumulative permissions a user has based on individual /group permissions or explicit/implicit permissions
- 4. Rules for how long data needs to be kept on backup and archive systems.
- 6. software designed to infiltrate or damage a computer system
- 7. A software that allows one physical computer to run several "digital only" computer spaces
- 9. A Windows feature that requires administrator permission for a user to change system settings
- 11. starts Windows in a basic state using limited files and drivers.
- 12. A type of malware that can replicate without human interaction and does not need to attach itself to a program.
- 16. User account with complete access to the system without restriction.
- 17. Internal or external hardware used to store data and files
- 19. a program that appears desirable but actually contains something harmful
- 20. Hardware and software that help visually or physically impaired people use the computer
- 23. A policy that allows employees to connect personally owned devices
- 24. wipe Erases data on a mobile device using a different device
- 25. Define WHO can access certain resources and WHAT they can do
- 29. A software that allows hardware to communicate with the computer operating system
- 31. to remove an app/program from a device
- 35. Rules that users must follow to access a network.
- 36. An attack through email trying to trick the user into giving private information
- 37. Malicious code attached to a program or file that corrupts a computer or destroys data.
- 38. matches the file on two or more devices with each other
- 39. Holes for peripheral cables.
- 40. return a system to working condition without reinstalling the operating system
- 42. A Windows program that provides detailed device settings
- 43. verifies the identity of someone who connects to a network
- 45. "Points to" a storage space on a network
- 46. Tool to monitor and limit user activities.
- 47. A text file of startup activity that lists all the drivers that load
- 48. a software or computer that blocks outside access to a network
- 49. A web service that uses one account to synchronize devices
Down
- 1. Remotely controls smart phones and tablets
- 3. A type of malware that locates and saves data from users without them knowing about it.
- 5. Explicit permissions applied directly to a file are applied before inherited permissions from a parent folder/group
- 8. Hackers use their social skills to trick people into revealing access credentials or personal information
- 10. The official source for Windows apps and outside media
- 13. a type of malware that blocks access to a computer system until a sum of money is paid.
- 14. A function/behavior that makes a software special
- 15. The ability of one device to work with another
- 18. A document outlining an agreement between two parties
- 21. Internet based computing
- 22. the identification of a user based on a physical characteristic
- 26. To prevent malware from being delivered or spread
- 27. A "phonebook" of users and devices on a network
- 28. Characteristics of a file
- 30. any external device that provides input or output for the computer
- 31. Identifies resources a user can access on a computer
- 32. copying files to a another location in case of equipment failure
- 33. An app installed on devices managed by an organization
- 34. Allowing multiple people to access a folder or file
- 41. Applies security settings to users and computers what they can do and access.
- 44. a software that delivers advertising that is unexpected and unwanted by the user