Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
a technique or device that examines a fingerprint, voice pattern, or the iris or retina of an eye in security measures
|
|
filtering
|
a process that can be used to cut down on or eliminate most junk mail.
|
|
fraud
|
something intended to decieve; delibrirate trickery intended to gain an advantage.
|
|
hoax
|
an attempt to decieve an audience into believing that something false is real
|
|
logic bomb
|
computer virus triggered by the apparance or disappearance of specified data
|
|
netiquette
|
a combo of the words net and ettiqutee, refers to good manners and proper behaviors when communicating through electronic media
|
|
phishing
|
types of personal info scams
|
|
pyramid schemes
|
an illict business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is enrolled
|
|
RDF Summary
|
a format originally developed to faciliate the syndication of news atricles
|
|
spam
|
Advertising sent in unsolicted bulk messages.
|
|
tagging
|
A keyword or term used to add in photos.
|
|
teleconferencing
|
A meeting or exchange of info via telecommunications.
|
|
time bomb
|
A program written to stop function after a certain time or date.
|
|
Trojan Horse
|
A computer program that appears harmless, but erases files, etc.
|
|
urban legend
|
A tale that can be considered to be true or not.
|
|
virus
|
A computer program that can replicate itself.
|
|
worm
|
A computer program that replicates itself to spread to other computers.
|