• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Biometric security measures
Examine a fingerprint, a voice, pattern, or the iris or retna of the eye
filtering
A process that can be used to cut down on or eliminate most junk mail
fraud
Something intended to decieve deliberation trickery intended to gain an advantage.
hoax
An attempt to decieve an audience into believing something false is real
logic bombing
Computer virus triggered by the appearance or disapearance of specifed data
netiquette
A combination of the words net and etequitte, refers to good manners and proper behaviors when communicating through electronic media.
phishing
Types of personal information scams
pyramid schemes
A illcit buisness model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters, generally, neither a product or service is delivered
RDF summary
A format originally developed to facillatate the syndication of news articles.
Spam
Unsolicated commercial e-mail that is sent to many people to promote products or services; also called junk mail
tagging
The practice of adding keywords to content to simplify searching.
Teleconferencing
which parties in remote locatiions can participate via telephone in group meeting.
Time bomb
Computer virus that does not cause damage until a certain date or until the system has been booted to a certain number of times
Trojan horse
Computer virus that does something different than what it is expected to do
urban legend
a story which at one time could have been partially true, but has grown from constant retelling ito a mythical yarn
virus
a comp. program that is written to cause corruption of data
worm
computer virus that makes many copies of itself resulting in the consumption of system resources that slows down or actually halts task