• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
acceptable use policy
a set of rules specifying legal and ethical system use and activities and the consequences of noncompliance.
a set of rules specifying legal and ethical system use and activities and the consequences of noncompliance.
acceptable use policy
Adware
a form of spyware that collects information about the user (without the user’s consent) to display advertisements in the Web browser, based on information it collects from the user’s browsing patterns.
a form of spyware that collects information about the user (without the user’s consent) to display advertisements in the Web browser, based on information it collects from the user’s browsing patterns.
Adware
Cookies
are small text files with a unique ID tag which is embedded in a Web browser and are saved on the user’s hard drive.
are small text files with a unique ID tag which is embedded in a Web browser and are saved on the user’s hard drive.
Cookies
Cybersquatting
registering, selling, or using a domain name to profit from someone else’s trademark.
registering, selling, or using a domain name to profit from someone else’s trademark.
Cybersquatting
digital divide
Information technology and the Internet have created a digital divide. Computers still aren’t affordable for many people. The digital divide has implications for education.
Information technology and the Internet have created a split in the population between those with computers/internet access and those without
digital divide
Intellectual property
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses.
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses.
Intellectual property
Keyloggers
monitor and record keystrokes and can be software or hardware devices.
monitor and record keystrokes and can be software or hardware devices.
Keyloggers
Log files
which are generated by Web server software, record a user’s actions on a Web site.
generated by Web server software, record a user’s actions on a Web site.
Log files
Phishing
is sending fraudulent e–mails that seem to come from legitimate sources, such as a bank or university, for the purpose of capturing private information, such as bank account numbers or Social Security numbers.
is sending fraudulent e–mails that seem to come from legitimate sources, such as a bank or university, for the purpose of capturing private information, such as bank account numbers or Social Security numbers.
Phishing
Spam
is unsolicited e–mail sent for advertising purposes.
is unsolicited e–mail sent for advertising purposes.
Spam
Spyware
software that secretly gathers information about users while they browse the Web.
software that secretly gathers information about users while they browse the Web.
Spyware
Virtual organizations
networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.
networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.
Virtual organizations