Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
41 Cards in this Set
- Front
- Back
biometric security measures
|
a device that examines a fingerprint, voice pattern, or iris of an eye
|
|
filtering
|
to screen data matching specific standers
|
|
Fraud
|
something intended to decieve; deliberate trickary intended to gain an advantage
|
|
hoax
|
attempt to decieve an audience into believing that something false is real
|
|
logic bomb
|
computer virus triggered by the appearance or disappearance of specific data
|
|
netiquette
|
a combination of the words net and etiquette refering to good manners and proper behavior when communicating through electronic media
|
|
phishing
|
types of personal info scams
|
|
pyramid schemes
|
an illicit business model where profits are based on investors ability to recruit other individuals
|
|
RDF summary
|
format originally developed to faciliate the sydication of news articles
|
|
spam
|
unsolicited commercaisl e-mail that is sent t many people at the same time to promote products or services
|
|
tagging
|
the practice of adding keywords to content to simplify searching
|
|
teleconferencing
|
telecommunicating with parties at seperate locations
|
|
time bomb
|
j
|
|
Trojan horse
|
j
|
|
urban legend
|
jk
|
|
virus
|
j
|
|
worm
|
k
|
|
ActiveX
|
j
|
|
client
|
j
|
|
cookie
|
j
|
|
digital certification
|
j
|
|
domain
|
j
|
|
File Transfer Protocol
|
H
|
|
geographic imaging
|
G
|
|
hit
|
j
|
|
home page
|
j
|
|
hypertext markup language
|
h
|
|
hyper transfer protocol
|
j
|
|
internet protocol address
|
j
|
|
Mosaic
|
j
|
|
podcast
|
k
|
|
portal
|
j
|
|
really simple syndication
|
j
|
|
secure sockets layer
|
k
|
|
social networking site
|
j
|
|
uniform resource locator
|
j
|
|
web 2.0
|
k
|
|
web cache
|
j
|
|
web site
|
j
|
|
webapp
|
j
|
|
wiki
|
h
|