Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
biometric security measures
|
a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
|
|
filtering
|
a process that can be used to cut down on or eliminate most junk mail.
|
|
fraud
|
somethign intended to decieve; deliberate trickery intended to gain an advantage
|
|
hoax
|
an attempt to decieve an audience that something false is real
|
|
logic bomb
|
computer virus triggered by the appearance of specific data.
|
|
netiquette
|
a combination of the words net and etiquette. refers to good manners and proper behaviors when communicating through electronic media.
|
|
phishing
|
types of personal information scams.
|
|
pyramid schemes
|
an illicite business model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
RDF summary
|
a forma originally developed to facilitate the syndication of news articles
|
|
spam
|
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
|
|
tagging
|
.
|
|
teleconferencing
|
.
|
|
time bomb
|
.
|
|
trojan horse
|
.
|
|
urban legend
|
.
|
|
virus
|
.
|
|
worm
|
.
|
|
activeX
|
.
|
|
client
|
.
|
|
cookie
|
.
|
|
digital
|
.
|
|
domain
|
,.
|
|
asdjf
|
.
|
|
sfd
|
.
|
|
dfja
|
.
|
|
sdfh
|
.
|
|
dfgaj
|
.
|
|
fgja
|
.
|
|
dakf
|
.
|
|
.
|
.
|
|
.
|
.
|
|
.
|
.
|
|
.
|
.
|
|
.
|
.
|
|
.
|
.
|
|
.
|
.
|