• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

is a virtual representation of yourself

Avatar

Occurs when malware or spyware replaces your browser's home page with its own in order to force more hits to a particular website.

Browser Hacking

online conversations you can chat with people in a chat room or by using a instant messaging service

Chat

technique that tricks users into clicking on a malicious link by adding the link to a transport layer over what appears to be a legitimate web page

clickjacking

that occurs online often through instant message text messaging email or even social network

cyberbulling

harassment or threatening behavior that occurs online

cyber stalking

dooced

if someone looses their job because of something posted on a blog or a social network that has been posted

flambait

comment posted by someone trying to provoke a argument or any angry response

a heated argument on social media outlet such as a web forum mailing list or chat room in which is intentional insulting

flamwar

email chain letter

hoax

a malicious software designed to damage a computer or steal your personal info

malware

something that has gone viral very quickly on the internet , such as a catch phrase , hoax topic concept or piece of media

meme

keeps visitors from leaving a website by locking them in a window opening multiple times on the desktop or reloading their website in an window that can be closed

mousetrapping

contains a lot of content that u probably don't want your kinds to see including porn vulgar language

obscienty

a technique used to redirect a legit websites traffic to another illegitimate website in order to gain access to personal info

pharming

scam where the scammer tries to trick you into revealing your personal information

phising

illegally sharing copy righted materials

piracy

content that people publish on websites involving social media such as blogs news groups where the media is component

posts

a users name is a virtual that is used to identify users of a website where social media is component

screen name

face identity someone creates and users to to decisive others for some kind of personal game

sock puppet

unsolicted emails or junk mail much of contains money scam or sexual content

spam

malware that collects info about users about their knowledge

spyware

a computer program containing hidden function that caused damage to other programs while appearing to preform valid information

trojan horse

person who posts comments just to get a rise out of people and cause distractions

troll

software organsm that is designed a computer by rapidly spreading one file to another causing great harm

virus