• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

a virtual representation of yourself

avatar

occurs when malware or spyware replaces your browsers home page with its own in order to force more hits to a more particular website

browser hyjacking

are live, online conversations. you can use an instant message service

chats

is a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a good website

clickjacking

bullying that occurs online, often through instant messaging , text message, email, or social networks

cyber bullying

any kind of harassment or threatening behavior that occurs online

cyber stalking

if someone looses their job because of something they posted on a blog or social networking site

dooced

every 5 strokes count as a word. therefore a 40 stroke line equals 8 words. two 40 stroke lines equal 16 words

figuring speed

a comment posted by someone trying to provoke an argument or an angry response

flamebait

is a heated argument in a social media outlet, in which intentionally insulting comments and personal attacks become a focus of conversation

flame war

is an email chain letter

hoax

a bad software that is designed to damage your computer or personal info

malware

something that has gone viral or spread rapidly around the internet such as a catch phrase

meme

a technique that keeps visitors from leaving a website by locking them into a computer

mousetrapping

contains a lot of content that you probably don't want kids to see, including porn, violent content or vulgar language

obscenity

a technique used to redirect a legitimate websites traffic to a illegitimate website in order to gain access to a users personal info

pharming

type of scam where the scammer tries to trick u into revealing your personal info

phishing

refers to illegally sharing copyrighted material

piracy

content that people publish on websites involving social media , such as blogs, newsgroups, and forums

posts

called a username, a virtual name that is used to identify users of a website where social media is a component, can be real name or pseudonym

screen name

a fake identity that someone creates and uses to deceive others for some kind of personal gain

sockpuppet

is unsolicited email or junk, much of which contains money spams or sexual content

spam

type of malware

spyware

malware that appears to be good or desirable

trojan horse

person who posts comments just to get a rise out of people and cause a distraction

troll