Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
biometric security
|
security that takes cans such as eye retinas, voice, etc
|
|
filtering
|
an object that processes something else through it
|
|
fraud
|
a particular instance of deceit or trickery
|
|
hoax
|
something intended to decieve
|
|
logic bomb
|
an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer
|
|
netiquette
|
the rules of etiquette that apply when communicating over computer networks
|
|
phishing
|
to make someone a victim
|
|
pyramid schemes
|
a criminal form of investment fraud in which a large return on a small amount of money is promised
|
|
RDF summary
|
.
|
|
spam
|
disruptive messages, especially commercial messages posted on a computer network or sent as e-mail.
|
|
biometric security measures
|
security that uses dna such as eye retina or voice
|
|
filtering
|
an object that filters something that passes through it
|
|
fraud
|
a particular instance of deceit or trickery
|
|
netiquette
|
the correct etiquette on how to act when communicating over computer networks
|
|
hoax
|
something intended to decieve
|
|
logic bomb
|
an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer
|
|
phishing
|
to make someone a victim
|
|
pyramid schemes
|
.
|
|
RDF summary
|
.
|
|
tagging
|
any loosely attached part of something
|
|
teleconferencing
|
a business meeting, educational session, etc., conducted among participants in different locations via telecommunications equipment.
|
|
time bomb
|
a bomb constructed to destroy at a certain time
|
|
Trojan Horse
|
a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
|
|
urban legend
|
a story that grows in exaggeration the more it is told
|
|
virus
|
a segment of self replicating code that damages a network or software
|
|
worm
|
a type of computer virus
|