Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
is a virtual representation of yourself |
Avatar |
|
Occurs when malware or spyware replaces your browser's home page with its own in order to force more hits to a particular website. |
Browser Hacking
|
|
online conversations you can chat with people in a chat room or by using a instant messaging service |
Chat |
|
technique that tricks users into clicking on a malicious link by adding the link to a transport layer over what appears to be a legitimate web page |
clickjacking |
|
that occurs online often through instant message text messaging email or even social network |
cyberbulling |
|
harassment or threatening behavior that occurs online |
cyber stalking |
|
dooced |
if someone looses their job because of something posted on a blog or a social network that has been posted |
|
flambait |
comment posted by someone trying to provoke a argument or any angry response |
|
a heated argument on social media outlet such as a web forum mailing list or chat room in which is intentional insulting |
flamwar |
|
email chain letter |
hoax |
|
a malicious software designed to damage a computer or steal your personal info |
malware |
|
something that has gone viral very quickly on the internet , such as a catch phrase , hoax topic concept or piece of media |
meme |
|
keeps visitors from leaving a website by locking them in a window opening multiple times on the desktop or reloading their website in an window that can be closed |
mousetrapping |
|
contains a lot of content that u probably don't want your kinds to see including porn vulgar language |
obscienty |
|
a technique used to redirect a legit websites traffic to another illegitimate website in order to gain access to personal info |
pharming |
|
scam where the scammer tries to trick you into revealing your personal information |
phising |
|
illegally sharing copy righted materials |
piracy |
|
content that people publish on websites involving social media such as blogs news groups where the media is component |
posts |
|
a users name is a virtual that is used to identify users of a website where social media is component |
screen name |
|
face identity someone creates and users to to decisive others for some kind of personal game |
sock puppet |
|
unsolicted emails or junk mail much of contains money scam or sexual content |
spam |
|
malware that collects info about users about their knowledge |
spyware |
|
a computer program containing hidden function that caused damage to other programs while appearing to preform valid information |
trojan horse |
|
person who posts comments just to get a rise out of people and cause distractions |
troll |
|
software organsm that is designed a computer by rapidly spreading one file to another causing great harm |
virus |