Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Biometric Security Measures
|
A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye
|
|
Filtering
|
A process that can be used to cut down on or eliminate most junk mail
|
|
Fraud
|
Something intended to decieve; deliberate trickery intended to gain an advantage
|
|
Hoax
|
An attempt to decieve an audience into believing that something false is real
|
|
Logic Bomb
|
Computer virus triggered by the appearence or disappearence of specified data
|
|
Netiquette
|
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media
|
|
Phishing
|
Types of personal information scams
|
|
Pyramid Schemes
|
An illicit buisness model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to there recruiters. No product or service is delivered
|
|
RDF Summary
|
A format originally developed to facilitate the syndication of news articles
|
|
Spam
|
Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk mail
|
|
Tagging
|
the practice of adding keywords to content to simplify searching
|
|
Teleconferencing
|
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
|
|
Time Bomb
|
a
|
|
Trojan Horse
|
a
|
|
Urban Legend
|
a
|
|
Virus
|
a
|
|
Worm
|
a
|