Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Biometric security measures
|
examine a fingerprint, voice pattern, or the iris or retina of the eye
|
|
filtering
|
a process that can be used to cut down on or eliminate most junk mail
|
|
fraud
|
something intended to deceive; deliberate trickery intended to gain an advantage
|
|
hoax
|
attempt to deceive an audience into believing that something false is real.
|
|
logic bomb
|
Computer virus triggered by the appearance or disappearance of specified data.
|
|
nettiquette
|
A combination of the words net and etiquette,refers to good manners and proper behaviors when communicating through electronic media.
|
|
phishing
|
Types of personal information scams.
|
|
pyramid squares
|
An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally,neither a product or service is delivered.
|
|
RDF summary
|
Formats originally developed to facilitate the syndication of news articles.
|
|
spam
|
Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services;also called junk e-mail.
|
|
Tagging
|
The practice of adding keywords to content to simplify searching
|
|
teleconfercing
|
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
|
|
time bomb
|
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain of times
|
|
trojan horse
|
Computer virus that does something different from what is expected to do
|
|
urban legend
|
a story that at one point could have been true, but has grown into a myth from constant retelling
|
|
virus
|
acomputer program that is written to cause corruption of data
|
|
worm
|
computer virus that makes easy copies of himself, resulting in the consumption of system resources that slows down or actually halts tasks.
|