• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
Teleconferencing
uses a telecommunication system to serve groups, permitting live exchange and sharing of info.
RDF Summary
Formats originally develpoed to facilities the syndication of news articles.
Tagging
Used in internet website to simplify information.
Netiquette
Refers to good manners and proper behavior when communicating in technical media.
Spam
Repeatedly annoying emailing or texting
Fraud
Manipulation of a computer or computer data, in to obtaining valuable possesions.
Phishing
Personal information scams
Pyramid Schemes
Illicit busines model to make profits off of investors that recruit payments.
Hoax
A Lie
Urban Legend
a story told many times but unknowing if it was true.
Virus
Data that is usually corrupted and can no longer be used.
Worm
Duplication of copies of data, making computers slow down.
Time Bomb
A Virus that doesnt appear until a certain date / time.
Logic bomb
A Virus that reappers and disappears data.
Trojan Horse
does something different than expected.
Bio metric securtity measures
oh