• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Biometric security measures
a tehcnique or device that examines a fingerprint
filtering
a process that can be used to cut down on
fraud
something intended to decieve
hoax
an attempt to deceive an audience into believeing that something is false not real
logic bomb
computer virus triggered by the appearance or dissapearnce of specified data
netiquette
a combination of the words net and etiquette, refers to good manners and proper behavior
phishing
types of personal information scams
pyramid schemes
an illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
RDF summary
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
spam
profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
tagging
business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
teleconferencing
investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
time bomb
who are enrolled to make payments to their recruiters.
trojan horse
model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their
urban legend
bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
virus
make payments to their recruiters.
worm
business model where enrolled to make payments to their recruiters.
ActiveX
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
client
who are enrolled to make payments to their recruiters.
cookie
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
digital certificate
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
domain
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
File Transfer Protocol
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
geographic imaging
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
hit
any time a piece of data matches search words you specify
home page
First page that is displayed when you browser is lauched
Hypertext Markup Language
Protocol that controls how Web pages are formatted and displayed
Hypertext Transfer Protocol
Protocol that defines how messages are formatted and transmitted over the World Wide Web
Internet Protocol Address
A numerical addressing system that uniquely identifies computers and networks linked in the Internet
Internet service provider
An organization or company that provides connectivity to the Internet through a telecomunication line or wireless system
Mosaic
the first graphical browser
Podcast
a method of publishing files to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player
Portal
A Web site that features useful content, but also contains links to other sites
Really Simple Syndication
A format orginially developed to syndicate news articles online this communication method wnow is used widely to share the contents of the blogs. Also known as Rich site Summery
Secure Sockets Layer
a
Social networking site
a
Uniform Resource Locator
a
Web 2.0
a
Web cache
a
Website
a
webapp
a
wiki
a