Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
Biometric Security Measures
|
steps to keep biometrics secure.
|
|
Filtering
|
a process that can be used to cut down on or eliminate most junk mail
|
|
Fraud
|
Something intended to decieve
|
|
Hoax
|
an attempt to decieve an audience into believing something false is real
|
|
Logic Bomb
|
computer virus triggered by the appearance or disappearnce of specified data.
|
|
Netiquette
|
refers to good manners and appropriate behaviors through electronic media.
|
|
Phishing
|
types of personal information scans.
|
|
Pyramid Schemes
|
illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
|
|
RDF Summary
|
a format originally developed to facilitate the syndication of news articles
|
|
Spam
|
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services.
|
|
Tagging
|
the practice of adding keywords to content to simplify searching.
|
|
Teleconferencing
|
telecommunications service in which parties can customize to create a new document similar to, but slightly different from the original.
|
|
Time Bomb
|
computer virus that does not cause its damage until a certain date or until the system has been booted a number of times.
|
|
Trojan Horse
|
computer virus that does something different than it is expected to do.
|
|
Urban Legend
|
a story that at one point could have been true, but has grown into a myth from constant retelling
|
|
Virus
|
a computer program that is written to cause corruption of data.
|
|
Worm
|
computer virus that makes easy copies of himself, resulting in the consumption of system resources that slows down or actually halts tasks.
|
|
ActiveX
|
a set of rules developed by Microsoft for Windows that controls Windows applicationsthat are downloaded from the internet and then run in a browser.
|
|
Client
|
a computer tha uses the services of another program
|
|
Cookie
|
small text files created by some Web pages when you visit the site.
|
|
Digital Certificate
|
an electronic document similar to an ID card
|
|
Domain
|
a name or other attribute that identifies a computer or Web site on the Internet
|
|
File Transfer Protocol
|
.
|
|
Geographic Imaging
|
.
|
|
Hit
|
.
|
|
Home Page
|
.
|
|
Hypertext Markup Language
|
.
|
|
Hypertext Transfer Protocol
|
.
|
|
Internet Protocol Address
|
.
|
|
Internet Service Provider
|
.
|
|
Mosaic
|
.
|
|
Podcast
|
.
|
|
Portal
|
.
|
|
Really Simple Syndication
|
.
|
|
Secure Sockets Layer
|
.
|
|
Social Networking Site
|
.
|
|
Uniform Resource Locater
|
.
|
|
Web 2.0
|
.
|
|
Web Cache
|
.
|
|
Web Site
|
.
|
|
Web App
|
.
|
|
Wiki
|
.
|