• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
biometric security measures
k
filtering
a process that can be used to cut down on or eliminate most junk mail
fraud
something intended to deceive; deliberate trickery intended to gian an advantage
hoax
an attempt to deceive an audience into believing that something fake is real
logic bomb
computer virus triggered by the appearance or disappearance of specific data
netiquette
refers to good manners and proper behaviors when communicating throug electronic media
phishing
types of personal information scams
pyramid schemes
an illicit business model where profits are based on the investors's ability to recruit other individuals who are enrolled to make payments to their recruiters
RDF Summary
a format originally developed to facilitate the syndication of news articles
spam
unsolicited commercail e-mail
tagging
k
teleconferencing
electronic transfer of data
time bomb
computer virus that does not cause its damage until a certain date
Trojan horse
computer virus that does osmething differnet from what it is expected to do
urban legend
a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
virus
a computer program that is written to caurse corruption of data
worm
computer virus that makes many copies of itself