• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security measures
Used for identification and authentication.
filtering
Cut down or eliminate most junk mail.
fraud
A computer crime that involves the manipulation of a computer.
hoax
An attempt to deceive an audience into believing that something false is real.
logic bomb
A type of virus.
netiquette
Refers to good manners and proper behaviors when communicating through electronic media.
phishing
Involves sending messages that appear to appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft.
pyramid schemes
An illicit business model.
RDF Summary
A format used to share the content of blogs.
spam
Unsolicited e-mail,essentially electronic junk mail.
tagging
Attach a label to.
teleconferencing
Permits the live exchange and sharing of information between two or more people.
time bomb
A type of virus.
Trojan horse
A type of virus.
urban legend
Stories that at one time could have been partially true.
virus
A program that has been written, usually by a hacker, to cause corruption of data on a computer.
worm
A type of virus.