Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
Examine a fingerprint a voice pattern or iris or retina of the eye and match entry originally stored in system.
|
|
filtering
|
.A method for copying data in a worksheet.
|
|
fraud
|
.Something intended to to deceive; deliberate trickery intended to gain an advantage
|
|
hoax
|
An attempt to decieve an auidence into believing something false is real.
|
|
logic bomb
|
Computer virus triggered by the apperance or disappearance of specified data
|
|
netiquette
|
A combination of the words net and etiquette, refers to good manners and proper behaviors when commuicating through electronic media.
|
|
phishing
|
Types of personal information scams
|
|
pyramid schemes
|
.An illicit buisness model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
|
|
RDF Summary
|
.a format orginally delveloped to facilitate the syndication of new articles
|
|
spam
|
Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk email.
|
|
tagging
|
.The practice of adding keywords to content to simplify searching
|
|
teleconferencing
|
.Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
|
|
time bomb
|
.Computer virus that does not cause its damage until a certain data or until the system has been booted a certain number of times.
|
|
Trojan horse
|
.computer virus that does something different from what it is expexted to do.
|
|
urban legend
|
.a story which at one time could have been partially true , but has grown from constant retelling into a mythical yarn.
|
|
virus
|
.a computer program that is written to cause corruption of data .
|
|
worm
|
computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actuallyhalts tasks.
|