CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
ALREADY GRADED A+
Address Spoofing Ans✓✓✓Using a fake IP or email address to conceal
the origin of a packet or message.
AES Ans✓✓✓stands for: Advanced Encryption Standard
how/why its used: encryption algorithm that uses multiple steps to
encrypt data. encryption standard currently used worldwide.
Antivirus Program Ans✓✓✓A computer program used to identify,
isolate, and eliminate viruses by scanning files as they arrive, leave, or
are executed. looks for and eliminates viruses, trojans, worms, and other
malware.
Botnet Ans✓✓✓A group of bots under the remote control of a
botmaster, used to distribute spam and denial-of-service attacks.
common type of online intrusions. Botnet malware opens ports on
victims' computers.
Case Tool Ans✓✓✓stands for: computer-aided software engineering
how/why its used: Software that is used to summarize system
requirements, diagram current and proposed information systems,
schedule development tasks, prepare documentation, and develop
computer programs.
, Common Carrier Ans✓✓✓A person or company, such as Delta Airlines
or AT&T, that transports goods or data for the general public. subject to
a set of government regulations.
First-generation computers Ans✓✓✓Computers, such as UNIVAC, that
used vacuum tubes to process and store data. characterized by custom
application programs made to order for the specific task the computer
was to perform.
Second-generation computers Ans✓✓✓Computers that use transistors
for data processing and storage instead of vacuum tubes. played a major
role in the U.S. space program.
Third-generation computers Ans✓✓✓Computers characterized by using
integrated circuits instead of transistors or vacuum tubes for data
processing. (IBM 360)
fourth-generation computers Ans✓✓✓Computers, such as today's
personal computers, servers, and mainframes, that use a general-purpose
microprocessor for data processing. (INTEL)
Computer Virus Ans✓✓✓A program designed to attach itself to a file,
reproduce, destroy data, display an irritating message, or otherwise
disrupt computer operations.