• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security measures
If a page was recently created here, it may not yet be visible because of a delay in updating the database; wait a few minutes and try the purge function.
filtering
is a semi-permeable paper barrier placed perpendicular to a liquid or air flow. It is used to separate fine solids from liquids or air.
fraud
In criminal law, a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulen
hoax
A hoax is a deliberately fabricated falsehood made to masquerade as truth
logic bomb
logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files.
netiquette
Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF.
Time bomb
A time bomb (or timebomb, time-bomb) is a bomb whose detonation is triggered by a timer. The use (or attempted use) of time bombs has been for various purposes ranging from insurance fraud to warfare to assassination; however, the most common use has been for politically motivated terrorism.
trojan hores
If a page was recently created here, it may not yet be visible because of a delay in updating the database; wait a few minutes and try the purge function.
Titles on Wikipedia are case sensitive.
urban legend
An urban legend, urban myth, urban tale, or contemporary legend, is a form of modern folklore consisting of stories that may or may not have been believed by their tellers to be true.
virus
A virus is a small infectious agent that can replicate only inside the living cells of an organism. Viruses can infect all types of organisms, from animals and plants to bacteria and archaea.
worm
The term worm (pronounced /ˈwɜrm/) refers to an obsolete taxon (vermes) used by Carolus Linnaeus and Jean-Baptiste Lamarck for all non-arthropod invertebrate animals, and stems from the Old English word wyrm.
phishing
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
pyramid schemes
A pyramid scheme is a non-sustainable business model that involves promising participants payment or services, primarily for enrolling other people into the scheme, rather than supplying any real investment or sale of products or services to the public.
RDF summary
RSS Rich Site Summary (originally RDF Site Summary, often dubbed Really Simple Syndication) is a family of web feed formats used to publish frequently updated works—such.
spam
variety of Spam are chopped pork should.
tagging
This kind of metadata helps describe an item and allows it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system.
Filtering
A process that cna be used to cut down on or eliminate most junk mail.