Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
k
|
|
filtering
|
a process that can be used to cut down on or eliminate most junk mail
|
|
fraud
|
something intended to deceive; deliberate trickery intended to gian an advantage
|
|
hoax
|
an attempt to deceive an audience into believing that something fake is real
|
|
logic bomb
|
computer virus triggered by the appearance or disappearance of specific data
|
|
netiquette
|
refers to good manners and proper behaviors when communicating throug electronic media
|
|
phishing
|
types of personal information scams
|
|
pyramid schemes
|
an illicit business model where profits are based on the investors's ability to recruit other individuals who are enrolled to make payments to their recruiters
|
|
RDF Summary
|
a format originally developed to facilitate the syndication of news articles
|
|
spam
|
unsolicited commercail e-mail
|
|
tagging
|
k
|
|
teleconferencing
|
electronic transfer of data
|
|
time bomb
|
computer virus that does not cause its damage until a certain date
|
|
Trojan horse
|
computer virus that does osmething differnet from what it is expected to do
|
|
urban legend
|
a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
|
|
virus
|
a computer program that is written to caurse corruption of data
|
|
worm
|
computer virus that makes many copies of itself
|