• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Biometric security measures
Examines a fingerprint, a voice pattern, or the iris or retina of the eye.
filtering
A process that can be used to cut down on or eliminate most junk mail.
fraud
Something intended to deceive; deliberate trickery intended to gain an advantage
hoax
An attempt to deceive an audience into believing that something false is real.
logic bomb
Computer virus triggered by the appearance or disappearance of specified data.
netiquette
A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
phishing
Types of personal information scams.
pyramid schemes
An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
RDF Summary
Formats originally developed to facilitate the syndication of news articles.
Spam
Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services also called junk mail
tagging
The practice of adding keywords to content to simplify searching
teleconfrencing
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
time bomb
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain of times
Trojan horse
Computer virus that does something different from what is expected to do
Urban Legend
a story that at one point could have been true, but has grown into a myth from constant retelling
virus
A computer program that is written to caus ecorruption of data
worm
computer virus that makes easy copies of himself, resulting in the consumption of system resources that slows down or actually halts tasks.
ActiveX
a set of rules developed by Microsoft for Windows that controls Windows applicationsthat are downloaded from the internet and then run in a browser
Client
a computer tha uses the services of another program
Cookie
small text files created by some Web pages when you visit the site.
Digital Certificate
an electronic document similar to an ID card
domain
A name or other attribute that identifies a compuetr or web site on the internet
File transfer protocol
Internet standard that allows users to download and upload files with other computers on the internet
Geographic imaging
Technology to change imagery of the earths surface into valuable information
hit
Any time a piece of data matches serach words you specify
home page
First page that is displayed when a browser is launched
HTML
Protocol that controls home web pages are formatted and displayed
Http
Protocol that defines how messages are formatted and transmitted over the world wide web
Ip
A numerical addressing system that uniquely identifies computers and networks linked to the internet
Internet service provider (ISP)
An organization or company that provides connectivity to the internet through a telecommunications line or wireless system
Mosaic
The first graphical browser.
podcast
A method of publishing files (primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
portal
A Web site that featurres useful content, but also contains links to other sites
Really Simple Syndication (RSS)
A format originally developed to syndicate news articles online, this communication method now is used widely to share the contents of blogs.
Secure Sockets Layer (SSL)
A protocol for managing the security of message transmissions on the Internet
social networking site
An online community that provides interavtion for groups of people who share a similar interest or activity.
Uniform Resource Locator (URL)
Address that tells the brwoser where to locate a Web page.
Web 2.0
Participatory Web, this term has several definitions , although the most popular one refers to Web sites where users can modify the content.
Web cache
A temporary storage area on your computer collecting data
Web site
A collection of realted HTLM-formatted Web pages located on the World Wide Web
webapp
Sites host software applications you can access with your Web broswer
wiki
A collaborative Web site that people can use to add, edit, remove, and organize Web page content.