Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
If a page was recently created here, it may not yet be visible because of a delay in updating the database; wait a few minutes and try the purge function.
|
|
filtering
|
is a semi-permeable paper barrier placed perpendicular to a liquid or air flow. It is used to separate fine solids from liquids or air.
|
|
fraud
|
In criminal law, a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulen
|
|
hoax
|
A hoax is a deliberately fabricated falsehood made to masquerade as truth
|
|
logic bomb
|
logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files.
|
|
netiquette
|
Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF.
|
|
Time bomb
|
A time bomb (or timebomb, time-bomb) is a bomb whose detonation is triggered by a timer. The use (or attempted use) of time bombs has been for various purposes ranging from insurance fraud to warfare to assassination; however, the most common use has been for politically motivated terrorism.
|
|
trojan hores
|
If a page was recently created here, it may not yet be visible because of a delay in updating the database; wait a few minutes and try the purge function.
Titles on Wikipedia are case sensitive. |
|
urban legend
|
An urban legend, urban myth, urban tale, or contemporary legend, is a form of modern folklore consisting of stories that may or may not have been believed by their tellers to be true.
|
|
virus
|
A virus is a small infectious agent that can replicate only inside the living cells of an organism. Viruses can infect all types of organisms, from animals and plants to bacteria and archaea.
|
|
worm
|
The term worm (pronounced /ˈwɜrm/) refers to an obsolete taxon (vermes) used by Carolus Linnaeus and Jean-Baptiste Lamarck for all non-arthropod invertebrate animals, and stems from the Old English word wyrm.
|
|
phishing
|
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
|
|
pyramid schemes
|
A pyramid scheme is a non-sustainable business model that involves promising participants payment or services, primarily for enrolling other people into the scheme, rather than supplying any real investment or sale of products or services to the public.
|
|
RDF summary
|
RSS Rich Site Summary (originally RDF Site Summary, often dubbed Really Simple Syndication) is a family of web feed formats used to publish frequently updated works—such.
|
|
spam
|
variety of Spam are chopped pork should.
|
|
tagging
|
This kind of metadata helps describe an item and allows it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system.
|
|
Filtering
|
A process that cna be used to cut down on or eliminate most junk mail.
|