• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security
-a technique or device that examines a finger print, voice pattern, or the the iris or retina of the eye
filtering
-A process that can be used to cut down on or eliminate most junk mail.
fraud
-Something intended to decieve; deliberate trickery intended to gain an advantage
hoax
-An attempt to decive an audience into believing that something false is real
logic bomb
-Computer virus triggered by the appearance or disappearance of specified data
netquette
-a combination of the words net and etiqutte, refers to good manners and proper behaviors when communication through electronic media
phishing
-Types of personal info scams
pyramid schemes
-an illicit business model where profits are based on the investors ability to recruit other indviduals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
RDF summary
-A format originally developed to faciliate the syndication of news article
spam
-Unsolicited commercial e-mail that is sent to many people at the smae time to promote products or services: also called junk e-mail
tagging
-The practice of adding keywords to content to simplify searching
teleconferencing
-Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
time bomb
-computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
trojan horse
-
urban leggend
-
virus
-
worm
-