Computing 5.0 / 5 based on 2 ratings ? ICTALLBTEC NationalNone Created by: m4c361Created on: 02-12-19 12:30 S is SMART stands for? Specific 1 of 29 M is SMART stands for? Measurable 2 of 29 A is SMART stands for? Achievable 3 of 29 R is SMART stands for? Realistic 4 of 29 T is SMART stands for? Time 5 of 29 What shape represents an INPUT/OUTPUT in a flowchart? Parallelogram 6 of 29 What shape represents an START/END in a flowchart? An Oval 7 of 29 What shape represents an PROCESS in a flowchart? A Rectangle 8 of 29 What shape represents an DECISION in a flowchart? A Diamond 9 of 29 What shape represents an DELAY in a flowchart? Bullet Shape 10 of 29 S in SWOT analysis stands for? Strengths 11 of 29 W in SWOT analysis stands for? Weaknesses 12 of 29 O in SWOT analysis stands for? Opportunities 13 of 29 T in SWOT analysis stands for? Threats 14 of 29 What is Functionality? how all of the aspects work/function 15 of 29 What is Usability? how easily the user can use it 16 of 29 What is Accessibility? is it accessible to users of varied abilities and needs 17 of 29 ADWARE Advertising software: shows banners or pop-ups when online 18 of 29 BOT Web Robot: gains control over your computer 19 of 29 BUG A mistake or error in a software program 20 of 29 RANSOMWARE Can block access to a system until money is paid 21 of 29 ROOTKIT Software tools allows access to your computer without being detected 22 of 29 TROJAN HORSE Used by hackers it disguises itself as something else 23 of 29 VIRUS Code copies itself to corrupt a system/destroy data 24 of 29 WORM Worms its way across computers leaving a copy in the memory of each one 25 of 29 SPYWARE Collects personal data / monitors browsing activity 26 of 29 White hat hackers usually security experts who are hired by organisations to legitimately try to hack into their system to identify security failings. 27 of 29 Grey hat hackers are those who hack into a system without malicious intent. It is still against the law and violates ethical standards. 28 of 29 Black hat hackers create malware to hack into systems 29 of 29
Comments
No comments have yet been made