• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Biometric Security Measures
steps to keep biometrics secure.
Filtering
a process that can be used to cut down on or eliminate most junk mail
Fraud
Something intended to decieve
Hoax
an attempt to decieve an audience into believing something false is real
Logic Bomb
computer virus triggered by the appearance or disappearnce of specified data.
Netiquette
refers to good manners and appropriate behaviors through electronic media.
Phishing
types of personal information scans.
Pyramid Schemes
illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
RDF Summary
a format originally developed to facilitate the syndication of news articles
Spam
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services.
Tagging
the practice of adding keywords to content to simplify searching.
Teleconferencing
telecommunications service in which parties can customize to create a new document similar to, but slightly different from the original.
Time Bomb
computer virus that does not cause its damage until a certain date or until the system has been booted a number of times.
Trojan Horse
computer virus that does something different than it is expected to do.
Urban Legend
a story that at one point could have been true, but has grown into a myth from constant retelling
Virus
a computer program that is written to cause corruption of data.
Worm
computer virus that makes easy copies of himself, resulting in the consumption of system resources that slows down or actually halts tasks.
ActiveX
a set of rules developed by Microsoft for Windows that controls Windows applicationsthat are downloaded from the internet and then run in a browser.
Client
a computer tha uses the services of another program
Cookie
small text files created by some Web pages when you visit the site.
Digital Certificate
an electronic document similar to an ID card
Domain
a name or other attribute that identifies a computer or Web site on the Internet
File Transfer Protocol
.
Geographic Imaging
.
Hit
.
Home Page
.
Hypertext Markup Language
.
Hypertext Transfer Protocol
.
Internet Protocol Address
.
Internet Service Provider
.
Mosaic
.
Podcast
.
Portal
.
Really Simple Syndication
.
Secure Sockets Layer
.
Social Networking Site
.
Uniform Resource Locater
.
Web 2.0
.
Web Cache
.
Web Site
.
Web App
.
Wiki
.