• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Biometric Security Measures
`
Filtering
A process that can be used to cut down on or eliminate most junk mail.
Fraud
Something intended to decieve; deliberate trickery intended to gain an advantage.
Hoax
An attempt to decieve an audience into believeing that something false is real.
Logic Bomb
Computer virus triggered by the apperance or disappearance of specified data.
Netiquette
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
Phishing
Types of personal information scans.
Pyramid Schemes
A illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delievered.
RDF Summary
1
Spam
Unsolicited commercial email that is sent to many people at the same time to promost products or services; also called junk email.
Tagging
The practice of adding keywords to content to simplifying searching.
Teleconferencing
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
Time Bomb
Computer viruse that does not cause its damage until a certain date or until the system as been booted a certain number of times.
Trojan Horse
Computer virus that does something different than what it is expected to do.
Urban Legend
A story which at one point could have been partially true, but has grown from constant retelling into a mythical yarn.
Virus
A computer program that is written to cause sorruption of data.
Worm
Computer virus that makes many copies of itself, resulting inthe consumption of system resources that slows down or actually halts tasks.