• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Copyright Laws

A copyright protects original works such as: literary works, musical works, dramatic works, pantomimes & choreographed works, pictorial, graphic, and sculptural works, motion pictures and other audiovisual works, sound recordings, architectural works, compilations (databases for example), written words on a website, and software programs on a website.

Fair Use

Fair Use allows limited use of a copyrighted work. Some examples of what are considered


fair use are: teaching, criticism, comment, news reporting, and research.

Trademarks

Trademarks are protected from infringement and also dilution.

Identity Theft

When a person gathers your personal information and poses as you to get credit, merchandise, services, or to use the identity to commit other crimes.

Cyberstalking
a crime where the attacker harasses the victim using electronic communication such as email, IM's, chat rooms, discussion groups.

Phishing

a common trick used on websites that have been hacked or are pretending to be legitimate. PayPal and eBay are two of the most common targets for phishing scams.

Privacy
the right or mandate of personal privacy concerning the storing, re purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Inappropriate Material

Sites devoted to pornography (however that might be defined), hate groups, and other inappropriate subject matter contain content thats unsuitable for children at various stages of maturity.

Cyberbullying

Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices.

Inaccurate or Biased Information

Websites that present information which has not been fact checked or cited.

Viruses/Hacking

When someone is able to log into a computer from a different location and implant a program that will infect the targeted computer.

Plagiarism

the practice of taking someone else's work or ideas and passing them off as one's own.

Internet Safety

the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.

Internet Troll

a person who sows discord on the Internet by starting arguments or upsetting people, by posting inflammatory comments.

Bias

prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.

Stereotype

a widely held but fixed and oversimplified image or idea of a particular type of person or thing.

Responsibility

the state or fact of having a duty to deal with something or of having control over someone.

Digital Certificate

verification that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.

Login

A username and password that is unique to the user. It should never be shared, unless to a teacher.

Internet of Things privacy

The special considerations required to protect the information of individuals from exposure in the internet of things environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.