Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
used for identification and authentication
|
|
filtering
|
cut down or eliminate most junk mail
|
|
fraud
|
a computer crime that involves the manipulation of a computer
|
|
hoax
|
an attempt to deceive an audience into believing that something false is real
|
|
logic bomb
|
a type of virus
|
|
netiquette
|
refers to good manners and proper behaviors when communicating through electronic media
|
|
phising
|
involves sending messages that appear to appear to come from legitimate sources asking to update or verify personal information, are in fact used to commit identity theft
|
|
pyramid schemes
|
an illicit business model
|
|
RDF summary
|
a format used to share the content of blogs
|
|
spam
|
unsolicited e-mail, esentially electronic junk mail
|
|
tagging
|
attack a label to
|
|
teleconferencing
|
permits the live exchange and sharing of information between two or more people
|
|
time bomb
|
a type of virus
|
|
trojan horse
|
a type of virus
|
|
urban legend
|
stories that at one time could have been partially true
|
|
virus
|
a program that has been written, usually by a hacker, to cause corruption of data on a computer
|
|
worm
|
a type of virus
|