Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
Used for identification and authentication.
|
|
filtering
|
Cut down or eliminate most junk mail.
|
|
fraud
|
A computer crime that involves the manipulation of a computer.
|
|
hoax
|
An attempt to deceive an audience into believing that something false is real.
|
|
logic bomb
|
A type of virus.
|
|
netiquette
|
Refers to good manners and proper behaviors when communicating through electronic media.
|
|
phishing
|
Involves sending messages that appear to appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft.
|
|
pyramid schemes
|
An illicit business model.
|
|
RDF Summary
|
A format used to share the content of blogs.
|
|
spam
|
Unsolicited e-mail,essentially electronic junk mail.
|
|
tagging
|
Attach a label to.
|
|
teleconferencing
|
Permits the live exchange and sharing of information between two or more people.
|
|
time bomb
|
A type of virus.
|
|
Trojan horse
|
A type of virus.
|
|
urban legend
|
Stories that at one time could have been partially true.
|
|
virus
|
A program that has been written, usually by a hacker, to cause corruption of data on a computer.
|
|
worm
|
A type of virus.
|