Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
a virtual representation of yourself |
avatar |
|
occurs when malware or spyware replaces your browsers home page with its own in order to force more hits to a more particular website |
browser hyjacking |
|
are live, online conversations. you can use an instant message service |
chats |
|
is a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a good website |
clickjacking |
|
bullying that occurs online, often through instant messaging , text message, email, or social networks |
cyber bullying |
|
any kind of harassment or threatening behavior that occurs online |
cyber stalking |
|
if someone looses their job because of something they posted on a blog or social networking site |
dooced |
|
every 5 strokes count as a word. therefore a 40 stroke line equals 8 words. two 40 stroke lines equal 16 words |
figuring speed |
|
a comment posted by someone trying to provoke an argument or an angry response |
flamebait |
|
is a heated argument in a social media outlet, in which intentionally insulting comments and personal attacks become a focus of conversation |
flame war |
|
is an email chain letter |
hoax |
|
a bad software that is designed to damage your computer or personal info |
malware |
|
something that has gone viral or spread rapidly around the internet such as a catch phrase |
meme |
|
a technique that keeps visitors from leaving a website by locking them into a computer |
mousetrapping |
|
contains a lot of content that you probably don't want kids to see, including porn, violent content or vulgar language |
obscenity |
|
a technique used to redirect a legitimate websites traffic to a illegitimate website in order to gain access to a users personal info |
pharming |
|
type of scam where the scammer tries to trick u into revealing your personal info |
phishing |
|
refers to illegally sharing copyrighted material |
piracy |
|
content that people publish on websites involving social media , such as blogs, newsgroups, and forums |
posts |
|
called a username, a virtual name that is used to identify users of a website where social media is a component, can be real name or pseudonym |
screen name |
|
a fake identity that someone creates and uses to deceive others for some kind of personal gain |
sockpuppet |
|
is unsolicited email or junk, much of which contains money spams or sexual content |
spam |
|
type of malware |
spyware |
|
malware that appears to be good or desirable |
trojan horse |
|
person who posts comments just to get a rise out of people and cause a distraction |
troll |