• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back
biometric security measures
a device that examines a fingerprint, voice pattern, or iris of an eye
filtering
to screen data matching specific standers
Fraud
something intended to decieve; deliberate trickary intended to gain an advantage
hoax
attempt to decieve an audience into believing that something false is real
logic bomb
computer virus triggered by the appearance or disappearance of specific data
netiquette
a combination of the words net and etiquette refering to good manners and proper behavior when communicating through electronic media
phishing
types of personal info scams
pyramid schemes
an illicit business model where profits are based on investors ability to recruit other individuals
RDF summary
format originally developed to faciliate the sydication of news articles
spam
unsolicited commercaisl e-mail that is sent t many people at the same time to promote products or services
tagging
the practice of adding keywords to content to simplify searching
teleconferencing
telecommunicating with parties at seperate locations
time bomb
j
Trojan horse
j
urban legend
jk
virus
j
worm
k
ActiveX
j
client
j
cookie
j
digital certification
j
domain
j
File Transfer Protocol
H
geographic imaging
G
hit
j
home page
j
hypertext markup language
h
hyper transfer protocol
j
internet protocol address
j
Mosaic
j
podcast
k
portal
j
really simple syndication
j
secure sockets layer
k
social networking site
j
uniform resource locator
j
web 2.0
k
web cache
j
web site
j
webapp
j
wiki
h