Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
Biometric security measures
|
Examines a fingerprint, a voice pattern, or the iris or retina of the eye.
|
|
filtering
|
A process that can be used to cut down on or eliminate most junk mail.
|
|
fraud
|
Something intended to deceive; deliberate trickery intended to gain an advantage.
|
|
hoax
|
An attempt to deceive an audience into believing that something false is real.
|
|
logic bomb
|
Computer virus triggered by the appearance or disappearance of specified data.
|
|
netiquette
|
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
|
|
phishing
|
Types of personal information scams.
|
|
pyramid schemes
|
An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.
|
|
RDF Summary
|
Formats originally developed to facilitate the syndication of news articles.
|
|
spam
|
Unsolicited commerical e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
|
|
tagging
|
The practice of adding keywords to content to simplify searching.
|
|
teleconferencing
|
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
|
|
time bomb
|
The horizontal band in a window that displays the name of the program, data file, or another type of window.
|
|
Trojan horse
|
Computer virus that does something different from what it is expected to do.
|
|
urban legend
|
Stories which at on etime could have been partially true, but have grown from constant retelling into a mythical yarn.
|
|
virus
|
A computer program that is written to cause corruption of data.
|
|
worm
|
Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
|
|
ActiveX
|
A set of rules developed by Microsoft for Windows that controls Windows applications that are downloaded from the Internet and then run in a browser.
|
|
client
|
A computer that uses the services of another computer.
|
|
cookie
|
Small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie files are stored on your computer.
|
|
digital certificate
|
An electronic document similar to an ID card.
|
|
domain
|
A name or other attribute that identifies a computer or Web site on the Internet.
|
|
File Transfer Protocol (FTP)
|
Internet standard that allows users to download and upload files with other computers on the Internet.
|
|
geographic imaging
|
Technology to change imagery of the Earth's surface into valuable information.
|
|
hit
|
Any time a piece of data matches search words you specify.
|
|
home page
|
First page that is displayed when a browser is launched.
|
|
Hypertext Markup Language (HTML)
|
Protocol that controls how Web pages are formatted and displayed.
|
|
Hypertext Transfer Protocol (HTTP)
|
Protocol that defines how messages are formatted and transmitted over the World Wide Web.
|
|
Internet Protocol (IP) address
|
A numerical addressing system that uniquely identifies computers and networks linked to the Internet.
|
|
Internet service provider (ISP)
|
An organization or company that provides connectivity to the internet through a telecommunications line or wireless system.
|
|
Mosaic
|
The first graphical browser.
|
|
podcast
|
A method of publishing files (primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
|
|
portal
|
A Web site that featurres useful content, but also contains links to other sites.
|
|
Really Simple Syndication (RSS)
|
A format originally developed to syndicate news articles online, this communication method now is used widely to share the contents of blogs.
|
|
Secure Sockets Layer (SSL)
|
A protocol for managing the security of message transmissions on the Internet.
|
|
social networking site
|
An online community that provides interavtion for groups of people who share a similar interest or activity.
|
|
Uniform Resource Locator (URL)
|
Address that tells the brwoser where to locate a Web page.
|
|
Web 2.0
|
Participatory Web, this term has several definitions , although the most popular one refers to Web sites where users can modify the content.
|
|
Web cache
|
A temporary storage area on your computer collecting data.
|
|
Web site
|
A collection of realted HTLM-formatted Web pages located on the World Wide Web.
|
|
webapp
|
Sites host software applications you can access with your Web broswer.
|
|
wiki
|
A collaborative Web site that people can use to add, edit, remove, and organize Web page content.
|