• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
filtering
process that can be used to cut down on or eliminate most junk mail.
fraud
something intended to decieve, deliberate trickery intended to gain an advantage.
biometric security measures
technique or device that examines a fingerprint, voiceattern, or the iruis or retina of the eye.
hoax
attempt to decieve an audience into beileving that something is fraud.
logic bomb
computer virus triggered by appearance or disappearance of specific data.
netiquette
combination fo words net and etiqutte, refers to good manners and proper behavior when communicationg through electronic media.
phishing
types fo personal informating scams.
pyramid schemes
illicit buisness model were profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters. generally, neither a product or service is deleived.
rdf summary
format orginally developed to facilitate the syndication of news article.
Spam
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services.
Tagging
the practice of adding keywords to content to simplify searching.
Teleconferencing
telecommunications service in which parties can customize to create a new document similar to, but slightly different from the original.
Time Bomb
computer virus that does not cause its damage until a certain date or until the system has been booted a number of times.
Trojan Horse
computer virus that does something different than it is expected to do.
Urban Legend
a story that at one point could have been true, but has grown into a myth from constant retelling
Virus
a computer program that is written to cause corruption of data.
Worm
computer virus that makes easy copies of himself, resulting in the consumption of system resources that slows down or actually halts tasks.
ActiveX
a set of rules developed by Microsoft for Windows that controls Windows applicationsthat are downloaded from the internet and then run in a browser.
Client
a computer tha uses the services of another program
Cookie
small text files created by some Web pages when you visit the site.
Digital Certificate
an electronic document similar to an ID card
Domain
a name or other attribute that identifies a computer or Web site on the Internet
File Transfer Protocol (FTP)
Internet standard that allows users to download and upload files with other computers on the Internet.
geographic imaging
Technology to change imagery of the Earth's surface into valuable information.
hit
Any time a piece of data matches search words you specify.
home page
First page that is displayed when a browser is launched.
Hypertext Markup Language (HTML)
Protocol that controls how Web pages are formatted and displayed.
Hypertext Transfer Protocol (HTTP)
Protocol that defines how messages are formatted and transmitted over the World Wide Web.
Internet Protocol (IP) address
numerical addressing system that uniquely identifies computers and networks linked to the Internet.
Internet service provider (ISP)
An organization or company that provides connectivity to the internet through a telecommunications line or wireless system.
Mosaic
The first graphical browser.
podcast
A method of publishing files (primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
portal
A Web site that featurres useful content, but also contains links to other sites.
Really Simple Syndication (RSS)
A format originally developed to syndicate news articles online, this communication method now is used widely to share the contents of blogs.
Secure Sockets Layer (SSL)
A protocol for managing the security of message transmissions on the Internet.
social networking site
An online community that provides interavtion for groups of people who share a similar interest or activity.
Uniform Resource Locator (URL)
Address that tells the brwoser where to locate a Web page.
Web 2.0
Participatory Web, this term has several definitions , although the most popular one refers to Web sites where users can modify the content.
Web cache
A temporary storage area on your computer collecting data.
Web site
A collection of realted HTLM-formatted Web pages located on the World Wide Web.
webapp
Sites host software applications you can access with your Web broswer.
wiki
A collaborative Web site that people can use to add, edit, remove, and organize Web page content.