• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
Avatar
A virtual representation of your self.
Browser Hijacking
Occurs when malware or spyware replaces your browser's home page with it's own in order to force more hits to a particular website.
Chats
Live, online conversations you can chat with people in a chat room or by using an instant messaging service.
Clickjaking
A technique that tricks users into clicking on a malicious (bad) link by adding the link to a transparent layer over what appears to be a legitimate webpage.
Cyber Bullying

Intimidation that occurs online, often through instant messaging, text, email, or social networks.

Cyber-stalking

Any kind of harassment or threatening behavior that occurs online.

Dooced

If someone loses their job because of something they posted on a blog or social networking site.

Flamebait

A comment posted by someone trying to provoke a flame (argument), or an angry response.

Flame War

A heated argument in a social media outlet such as a web form intentionally insulting comments and personal attacks become a focus of conversation.

Hoax

An email chain letter.



Malware

A malicious software that is designed to damage your computer or steal your personal information.

Meme

Something that has gone viral, or spread rapidly around he internet, such as a catchphrase, hoax, or any piece of media.

Mousetrapping

A technique used that keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website that cant be closed.

Obscenity

Contains a lot of content that you don't want.

Pharming

A technique used to redirect a legitimate website's traffic to another illegitimate website in order to gain access to a user's personal information.

Phishing

Type of scam where the scammer tries to trick you into revealing your personal information.

Piracy

Refers to illegally sharing copyrighted materials.

Posts

Content that people publish on websites involving social media,