Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
Biometric security measures
|
a tehcnique or device that examines a fingerprint
|
|
filtering
|
a process that can be used to cut down on
|
|
fraud
|
something intended to decieve
|
|
hoax
|
an attempt to deceive an audience into believeing that something is false not real
|
|
logic bomb
|
computer virus triggered by the appearance or dissapearnce of specified data
|
|
netiquette
|
a combination of the words net and etiquette, refers to good manners and proper behavior
|
|
phishing
|
types of personal information scams
|
|
pyramid schemes
|
an illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
|
|
RDF summary
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
spam
|
profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
tagging
|
business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
teleconferencing
|
investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
time bomb
|
who are enrolled to make payments to their recruiters.
|
|
trojan horse
|
model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their
|
|
urban legend
|
bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
virus
|
make payments to their recruiters.
|
|
worm
|
business model where enrolled to make payments to their recruiters.
|
|
ActiveX
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
client
|
who are enrolled to make payments to their recruiters.
|
|
cookie
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
digital certificate
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
domain
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
File Transfer Protocol
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
geographic imaging
|
illicit business model where profits are bases on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
hit
|
any time a piece of data matches search words you specify
|
|
home page
|
First page that is displayed when you browser is lauched
|
|
Hypertext Markup Language
|
Protocol that controls how Web pages are formatted and displayed
|
|
Hypertext Transfer Protocol
|
Protocol that defines how messages are formatted and transmitted over the World Wide Web
|
|
Internet Protocol Address
|
A numerical addressing system that uniquely identifies computers and networks linked in the Internet
|
|
Internet service provider
|
An organization or company that provides connectivity to the Internet through a telecomunication line or wireless system
|
|
Mosaic
|
the first graphical browser
|
|
Podcast
|
a method of publishing files to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player
|
|
Portal
|
A Web site that features useful content, but also contains links to other sites
|
|
Really Simple Syndication
|
A format orginially developed to syndicate news articles online this communication method wnow is used widely to share the contents of the blogs. Also known as Rich site Summery
|
|
Secure Sockets Layer
|
a
|
|
Social networking site
|
a
|
|
Uniform Resource Locator
|
a
|
|
Web 2.0
|
a
|
|
Web cache
|
a
|
|
Website
|
a
|
|
webapp
|
a
|
|
wiki
|
a
|