• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Illegally copying or downloading music, movies, software, or other copyrighted material.
Piracy
a commonly used technique where a user gets “locked” in a website. While surfing the Internet it is possible to click a website and have multiple undesirable websites open. When this happens, you often cannot close or back out of the sites and must close your Web browser completely.
Mouse Trapping
this is a system that creates a special “wall” to keep out unwanted information, like spam and viruses, and unwanted people, like hackers.
Firewall
computer programs that can destroy files or make your computer “crash.” They can be sent by e-mail or through other file sharing programs. Anti-virus software and not downloading information from people you don’t know can help keep viruses from damaging your computer.
Virus
any computer code that is intentionally introduced into a system to damage or destroy files or disrupt the operation of a computer.
Malicious Code
the act of posting content on a Blog
Blogging
when someone takes someone else’s words and using them as their own.
Plagiarism
unwanted e-mail from someone you don’t know.
Spam
an online scam that attacks the browser’s address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals personal information.
Pharming
courtesy, honesty, and polite behavior practiced on the Internet.
Netiquette
a popular term for someone who accesses computer information either legally or illegally.
Hacker
online techniques sexual predators use to get to know their victims in preparation for sexual abuse.
Grooming
Scam involves sending fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
Phishing
Methods individuals use to track, lure, or harass another person online.
Cyberstalking
a variation of chat rooms that allow users to communicate through text messages.
Instant Messaging
Bullying through Internet applications and technologies such as IM, social networking sites, and cell phones.
Cyberbullying
websites use these files to store information on your browser.
Cookie