• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
biometric security measures
examines fingerprint, voice pattern, retina, or the iris of the eye
filtering
a process that can be used to cut down on or eleiminate most junk mail
fraud
something intended to decieve;deliberate trickery intended to gain knowlege
hoax
an attempt to decieve an audience into believing that something is false
logic bomb
computer virus triggered by the appearance or disappearance of specified data
netiquette
refers to good manners and proper behaviors when communicating through electronic media.
phishing
types of personal info scams
pyramid schemes
an illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. neither product nor service is delivered
RDF Summary
a format originally developed to facillitate the syndication of news articles
spam
unsoliciated commercial e-mail that is sent to many people at the same time to promote products or services-junk mail
tagging
the practice of adding keywords to content to simplify searching
teleconferencing
telecomunications service in which parties in remote locations can participate via telephone in a group meeting
time bomb
computer virus that does not cause its damage until a certain date or until the systemhas been booted a certain number of times
trojan horse
computer virus that does something different from what it is expected to do
urban legend
a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
virus
a computer program that is written to cause corruption of data
worm
computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halsts tasks
Active X
a set of rules developed by Microsoft for Windows that controls Windows applications that are downloaded from the internet and then run in a browser
client
computer that uses services of another computer
cookie
small text files created by some web pages hen you visit the site that may include information about your preferences for web page;stored on your computer
digital certificate
an electronic document similar to an ID ard
doamin
a name or other attribute that identifies a computer or web site on the internet
file Transfer protocol
internet standard that allows users to download and upload files with other computers on the internet
geographic imaging
technology to change imagery of the Earth's surface into valuable information
hit
any time a piece of data matches search words you specify
home page
1st page that is displayed when a browser is launched
Hypertext markup language
protocol that controls how web pages are formatted and displayd
Hypetext transfer protocol
protocol that defines how messages are formatted aand transmitted over the World WIDE wEB
Internet protocol (ip)address
a numerical addressing system that uniquely identifies computers and networks linked to the Internet
internet service provider(isp)
an organization or company that provides connetivity to the Internet thru a telecommunications line or wireless system
Mosaic
the 1st graphical browser
podast
a method of publishing files(primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player
portal
a web site that features useful content,but also contains links to other sites
really simple syndications
a format origionally developed to syndicate news articles online, this communication method is used widely to share the contents of blogs. Aka rich site summary and rdf summary
secure sockets layer
protocaol for managing the security of message transitions on the Internet
social networking site
an online community that provides interaction for groups of people who share similar interest or activity
uniform resource locator
the address of a web page,FTP site, audio stream, or other internet resource
Web 2.0
the internet viewed as a medium in which interactive experience, in the form of blogs, wikis, forums, etc, plays a more important role than simply accessing information
website
a collection of related HTML-formatted web pages located on world wide web
web cache
a temporary storage area on your computer for collecting data
webapp
an application without platform constraints or installation requirements that is accessed thru a web browser over a network like intranet or internet
wiki
a collaberative web site that can be edited by anyone with access