Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
Biometric Security Measures
|
Examine a fingerprint, a voice, pattern, or the iris or retna of the eye
|
|
Flitering
|
A process that can be used to cut down on or eliminate most junk mail
|
|
Fraud
|
Something intended to decieve deliberation trickery intended to gain an advantage.
|
|
Hoax
|
An attempt to decieve an audience into believing something false is real
|
|
Logic Bomb
|
Computer virus triggered by the appearance or disapearance of specifed data
|
|
Netiquette
|
A combination of the words net and etequitte, refers to good manners and proper behaviors when communicating through electronic media.
|
|
Phishing
|
Types of personal information scams
|
|
Pyramid Schemes
|
A illcit buisness model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters, generally, neither a product or service is delivered
|
|
RDF Summary
|
A format originally developed to facillatate the syndication of news articles.
|
|
Spam
|
Unsolicated commercial e-mail that is sent to many people to promote products or services; also called junk mail
|
|
Tagging
|
The practice of adding keywords to content to simplify searching.
|
|
Teleconferencing
|
Telecommunication service in which parties in remote locatiions can participate via telephone in group meeting.
|
|
Time Bomb
|
Computer virus that does not cause damage until a certain date or until the system has been booted to a certain number of times
|
|
Trojan Horse
|
Computer virus that does something different than what it is expected to do
|