• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security measures
used for identification and authentication
filtering
cut down or eliminate most junk mail
fraud
a computer crime that involves the manipulation of a computer
hoax
an attempt to deceive an audience into believing that something false is real
logic bomb
a type of virus
netiquette
refers to good manners and proper behaviors when communicating through electronic media
phising
involves sending messages that appear to appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft
pyramid schemes
an illicit business model
RDF summary
a format used to share the content of blogs
spam
unsolicited e-mail, esentially electronic junk mail
tagging
attack a label to
teleconferencing
permits the live exchange and sharing of information between two or more people
time bomb
a type of virus
trojan horse
a type of virus
urban legend
stories that at one time could have been partially true
virus
a program that has been written, usually by a hacker, to cause corruption of data on a computer
worm
a type of virus