• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
biometric security measures
a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
filtering
a process that can be used to cut down on or eliminate most junk mail.
fraud
somethign intended to decieve; deliberate trickery intended to gain an advantage
hoax
an attempt to decieve an audience that something false is real
logic bomb
computer virus triggered by the appearance of specific data.
netiquette
a combination of the words net and etiquette. refers to good manners and proper behaviors when communicating through electronic media.
phishing
types of personal information scams.
pyramid schemes
an illicite business model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters.
RDF summary
a forma originally developed to facilitate the syndication of news articles
spam
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
tagging
.
teleconferencing
.
time bomb
.
trojan horse
.
urban legend
.
virus
.
worm
.
activeX
.
client
.
cookie
.
digital
.
domain
,.
asdjf
.
sfd
.
dfja
.
sdfh
.
dfgaj
.
fgja
.
dakf
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.