• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security measures
a technique or device that examines a fingerprint, voice pattern, or the iris or retina of an eye in security measures
filtering
a process that can be used to cut down on or eliminate most junk mail.
fraud
something intended to decieve; delibrirate trickery intended to gain an advantage.
hoax
an attempt to decieve an audience into believing that something false is real
logic bomb
computer virus triggered by the apparance or disappearance of specified data
netiquette
a combo of the words net and ettiqutee, refers to good manners and proper behaviors when communicating through electronic media
phishing
types of personal info scams
pyramid schemes
an illict business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is enrolled
RDF Summary
a format originally developed to faciliate the syndication of news atricles
spam
Advertising sent in unsolicted bulk messages.
tagging
A keyword or term used to add in photos.
teleconferencing
A meeting or exchange of info via telecommunications.
time bomb
A program written to stop function after a certain time or date.
Trojan Horse
A computer program that appears harmless, but erases files, etc.
urban legend
A tale that can be considered to be true or not.
virus
A computer program that can replicate itself.
worm
A computer program that replicates itself to spread to other computers.