Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
A person who has committed a crime in cyberspace, using computers or networks illegally against a person or a company. |
Cyber criminal |
|
someone who uses the internet to harass, intimidate, embarrass, or demean others. |
Cyber bully |
|
someone who uses the internet to locate and get to know children and teenagers, often because they want to meet them in person and hurt them. |
Cyber predator |
|
A person who breaks into computers to view and possibly alter information they shouldn’t have access to. Hackers also write scripts that other people, called “script kiddies” can use to break into computers. |
Hacker |
|
Somebody who uses a program made by somebody else to break into people’s computers. Script kiddies usually do not know how to make these programs themselves. |
Script kiddie |
|
Software that harms your computer. Viruses, Trojan horses, and worms are all types of malware |
Malware |
|
A program that can wipe out information on your computer and create major problems. You can get viruses on your computer by downloading things from websites or from attachments in email messages. |
Virus |
|
A nasty program disguised as legitimate software. Attackers can either attach a Trojan horse to useful software, or trick you into thinking the Trojan horse itself is useful software. Trojan horses are different from viruses and worms because they cannot replicate themselves. |
Trojan horse |
|
Destructive software that can get into computers or networks and harm them by deleting, modifying, or distributing the data. |
Worm |
|
A software program that makes advertisements appear on your computer. Adware is usually included with other programs so that when you install the program you want, you also install the adware. Sometimes adware is even installed on your computer without you knowing about it. |
Adware |
|
Software that is installed on your computer without your knowledge. Spyware tracks what you do on the internet and sometimes gets information about you from your computer. You can get spyware on your computer by installing free programs you find on the web, visiting websites whose hidden purpose is to download spyware, or by downloading files on the internet. |
Spyware |
|
A software program that you can install in your computer to act like a security guard to monitor and control the traffic coming into and out of your computer. Firewalls can help protect your computer against computer viruses and intruders. |
Firewall |
|
A software program that protects your computer against computer viruses, worms, and Trojan horses. The program will tell you when it finds a virus on your computer and help you get rid of it. |
Anti-virus software |
|
Software programs that you can install on your computer to combat spyware. They work in two ways: 1.) prevent other spyware from being installed; 2.) detect and remove spyware you already have on your computer. |
Spyware blocker |
|
Storage |
The act of keeping or maintaining data. |
|
Input |
The process of sending information to the computer |
|
Processing |
The event of a program being loaded, retrieved, transmitted, or executed. |
|
Output |
The process of the computer presenting, displaying, or otherwise giving data |
|
Hardware |
The physical components of a computer |
|
Software |
Computer programs that perform a specific task |
|
Firmware |
Software that has been permanently installed on a computer |
|
Application |
A subclass computer program for end users |
|
Utility |
Feature or program included with an operating system that performs system related tasks |
|
Driver |
Type of computer program that That enables the operating system to interact with hardware devices |
|
Kernel |
Core of the operating system that is loaded into memory when the system boots up |