Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Avatar |
Virtual representation of yourself |
|
Browser Hijacking |
when spyware replaces your browsers homepage with its own in order to force more hits to a particular website |
|
Chat |
live,online conversation in a chat room or instant messaging service |
|
Click Jacking |
technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legit webpage |
|
Cyber bullying |
bullying that occurs online,often through instant messaging,text messaging,email,and social networks |
|
Cyber stalking |
Any kind of harassment/ threatening behavior that occurs online. |
|
Dooced |
If someone looses their job because of something they posted on a social networking site |
|
Flamebait |
A comment posted by someone trying to provoke,or an angry response |
|
Flame War |
A heated argument in a social media outlet which intentionally insulting comments and profanity become focus of conversation |
|
Hoax |
A email chain letter |
|
Malware |
A malicious software that is designed to damage your computer or steal personal info |
|
Meme |
Something that has gone viral or spread rapidly around the internet |
|
Mousetrapping |
A technique that keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop that cannot be closed |
|
Obscenity |
content you would not want you kids to see |
|
Pharming |
A technique used to redirect a good websites traffic to another not good website to gain access to users information |
|
Phishing |
Type of scam where the scammer tricks you into revealing your personal info. |
|
Piracy |
refers to illegally sharing copyrighted material |
|
Posts |
Content people publish on websites involving social media |
|
Screen name |
user name; name used to identify users of a web site where social media is a component |
|
Sockpuppet |
Fake identity someone creates and uses to deceive others for some kind of personal info. |
|
Spam |
An email you didn't ask for |
|
Spyware |
Type of malware that collects info from users w/o their knowledge |
|
Trojan Horse |
Malware,computer program containing hidden function that causes damage to other programs while appearing to preform valid funtions |
|
Troll |
A person who posts comments to get a rise out of people and cause distraction |
|
Virus |
self replicating software program designed to infect a computer by rapidly spreading from one file to another causing harm |