• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
Biometric security measures
examine a fingerprint, a voice pattern, or the iris or retina of the eye
filtering
A process that can ber used to cut sown on or eliminate most junk mail
fraud
Something intended to decieve; deliberate trickery intended to gain and advantage.
hoax
An attempt to deceive an audience into believing that something false is real.
logic bomb
Computer virus triggered by the appearance or disappearance of specified data.
netiquette
A combination of the words net and entiquette, refers to good manners and proper behviors when communication through electronic media.
phising
Types of personal information scams.
pyramid
An illicit business model whre profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recriters Generally, neither a product or service is delivered
pyramid schemes
An illicit business model whre profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recriters Generally, neither a product or service is delivered.
RDF Summary
A format originally developed to facilitate the syndication of news articles.
spam
Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail
tagging
the practice of adding keywords to content to simplify searching.
teleconferencing
tgelecommunications service in which parties in remote locations can participate via telephone in a group meeting.
time bomb
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
trojan horse
Computer virus that does something different from what it is expected to do.
urban legend
A story which at one time could have been partially true. but has grown from constant retelling into a mythical yarn .
virus
A computer program that is written to cause corruption of data.
worm
Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts it.
ActiveX
A set of rules developed by Microsoft for windows that controls Windows applications that are downloaded from the Internet and then run in a browser.
client
A computer that uses the services of another program.
cookies
Small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page;cookie files are stored on your computer.
digital cerificate
An electronic document similar to an ID card.
domain
A name or other attriburte that identifies a computer or Web site on the Internet.
File Transfer Protocaol (FTP)
Internet standard that allows users to download and upload files with other computers on the Internet
geographic imaging
Technology to change imagery of the Earths surface into valuable information.
hit
Any time a piece of data matches search words you specify.
home page
First page that is displayed when a browser is launched.
Hypertext Markup Language
Protocol that controls how Web pages are formatted and displayed
Hpertext Transfer Protocol
Protocol that defines how messages are formatted and transmitted over the World Wide Web.
Internet Protocol address
A numerical addressing system that uniquely identifies computers and networks linked to the Internet.
Internet service provider ISP
An organization or company that provides connectivity to the Internet through a telecommunications line or wireless system.
Mosaic
The first graphical browser
podcast
A method of publishing files to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
portal
A Web site that features useful content, but also contaings links to other sites.
Really Simple Syndication
A format originally developed to syndicate new articles online, this communication method now is used widely to share tha contents of blogs. also known as Rich site Summary and RDF Summary.