• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Biometric security measures
Examines a fingerprint, a voice pattern, or the iris or retina of the eye.
filtering
A process that can be used to cut down on or eliminate most junk mail.
fraud
Something intended to deceive; deliberate trickery intended to gain an advantage.
hoax
An attempt to deceive an audience into believing that something false is real.
logic bomb
Computer virus triggered by the appearance or disappearance of specified data.
netiquette
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
phishing
Types of personal information scams.
pyramid schemes
An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.
RDF Summary
Formats originally developed to facilitate the syndication of news articles.
spam
Unsolicited commerical e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
tagging
The practice of adding keywords to content to simplify searching.
teleconferencing
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
time bomb
The horizontal band in a window that displays the name of the program, data file, or another type of window.
Trojan horse
Computer virus that does something different from what it is expected to do.
urban legend
Stories which at on etime could have been partially true, but have grown from constant retelling into a mythical yarn.
virus
A computer program that is written to cause corruption of data.
worm
Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
ActiveX
A set of rules developed by Microsoft for Windows that controls Windows applications that are downloaded from the Internet and then run in a browser.
client
A computer that uses the services of another computer.
cookie
Small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie files are stored on your computer.
digital certificate
An electronic document similar to an ID card.
domain
A name or other attribute that identifies a computer or Web site on the Internet.
File Transfer Protocol (FTP)
Internet standard that allows users to download and upload files with other computers on the Internet.
geographic imaging
Technology to change imagery of the Earth's surface into valuable information.
hit
Any time a piece of data matches search words you specify.
home page
First page that is displayed when a browser is launched.
Hypertext Markup Language (HTML)
Protocol that controls how Web pages are formatted and displayed.
Hypertext Transfer Protocol (HTTP)
Protocol that defines how messages are formatted and transmitted over the World Wide Web.
Internet Protocol (IP) address
A numerical addressing system that uniquely identifies computers and networks linked to the Internet.
Internet service provider (ISP)
An organization or company that provides connectivity to the internet through a telecommunications line or wireless system.
Mosaic
The first graphical browser.
podcast
A method of publishing files (primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
portal
A Web site that featurres useful content, but also contains links to other sites.
Really Simple Syndication (RSS)
A format originally developed to syndicate news articles online, this communication method now is used widely to share the contents of blogs.
Secure Sockets Layer (SSL)
A protocol for managing the security of message transmissions on the Internet.
social networking site
An online community that provides interavtion for groups of people who share a similar interest or activity.
Uniform Resource Locator (URL)
Address that tells the brwoser where to locate a Web page.
Web 2.0
Participatory Web, this term has several definitions , although the most popular one refers to Web sites where users can modify the content.
Web cache
A temporary storage area on your computer collecting data.
Web site
A collection of realted HTLM-formatted Web pages located on the World Wide Web.
webapp
Sites host software applications you can access with your Web broswer.
wiki
A collaborative Web site that people can use to add, edit, remove, and organize Web page content.