Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Copyright Laws |
A copyright protects original works such as: literary works, musical works, dramatic works, pantomimes & choreographed works, pictorial, graphic, and sculptural works, motion pictures and other audiovisual works, sound recordings, architectural works, compilations (databases for example), written words on a website, and software programs on a website. |
|
Fair Use |
Fair Use allows limited use of a copyrighted work. Some examples of what are considered fair use are: teaching, criticism, comment, news reporting, and research. |
|
Trademarks |
Trademarks are protected from infringement and also dilution. |
|
Identity Theft |
When a person gathers your personal information and poses as you to get credit, merchandise, services, or to use the identity to commit other crimes. |
|
Cyberstalking
|
a crime where the attacker harasses the victim using electronic communication such as email, IM's, chat rooms, discussion groups.
|
|
Phishing |
a common trick used on websites that have been hacked or are pretending to be legitimate. PayPal and eBay are two of the most common targets for phishing scams. |
|
Privacy
|
the right or mandate of personal privacy concerning the storing, re purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
|
|
Inappropriate Material
|
Sites devoted to pornography (however that might be defined), hate groups, and other inappropriate subject matter contain content thats unsuitable for children at various stages of maturity. |
|
Cyberbullying |
Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices. |
|
Inaccurate or Biased Information |
Websites that present information which has not been fact checked or cited. |
|
Viruses/Hacking |
When someone is able to log into a computer from a different location and implant a program that will infect the targeted computer. |
|
Plagiarism |
the practice of taking someone else's work or ideas and passing them off as one's own. |
|
Internet Safety |
the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. |
|
Internet Troll |
a person who sows discord on the Internet by starting arguments or upsetting people, by posting inflammatory comments. |
|
Bias |
prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair. |
|
Stereotype |
a widely held but fixed and oversimplified image or idea of a particular type of person or thing. |
|
Responsibility |
the state or fact of having a duty to deal with something or of having control over someone. |
|
Digital Certificate |
verification that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. |
|
Login |
A username and password that is unique to the user. It should never be shared, unless to a teacher. |
|
Internet of Things privacy |
The special considerations required to protect the information of individuals from exposure in the internet of things environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network. |