Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Biometric Security Measures
|
`
|
|
Filtering
|
A process that can be used to cut down on or eliminate most junk mail.
|
|
Fraud
|
Something intended to decieve; deliberate trickery intended to gain an advantage.
|
|
Hoax
|
An attempt to decieve an audience into believeing that something false is real.
|
|
Logic Bomb
|
Computer virus triggered by the apperance or disappearance of specified data.
|
|
Netiquette
|
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
|
|
Phishing
|
Types of personal information scans.
|
|
Pyramid Schemes
|
A illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delievered.
|
|
RDF Summary
|
1
|
|
Spam
|
Unsolicited commercial email that is sent to many people at the same time to promost products or services; also called junk email.
|
|
Tagging
|
The practice of adding keywords to content to simplifying searching.
|
|
Teleconferencing
|
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
|
|
Time Bomb
|
Computer viruse that does not cause its damage until a certain date or until the system as been booted a certain number of times.
|
|
Trojan Horse
|
Computer virus that does something different than what it is expected to do.
|
|
Urban Legend
|
A story which at one point could have been partially true, but has grown from constant retelling into a mythical yarn.
|
|
Virus
|
A computer program that is written to cause sorruption of data.
|
|
Worm
|
Computer virus that makes many copies of itself, resulting inthe consumption of system resources that slows down or actually halts tasks.
|