• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
biometric security
security that takes cans such as eye retinas, voice, etc
filtering
an object that processes something else through it
fraud
a particular instance of deceit or trickery
hoax
something intended to decieve
logic bomb
an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer
netiquette
the rules of etiquette that apply when communicating over computer networks
phishing
to make someone a victim
pyramid schemes
a criminal form of investment fraud in which a large return on a small amount of money is promised
RDF summary
.
spam
disruptive messages, especially commercial messages posted on a computer network or sent as e-mail.
biometric security measures
security that uses dna such as eye retina or voice
filtering
an object that filters something that passes through it
fraud
a particular instance of deceit or trickery
netiquette
the correct etiquette on how to act when communicating over computer networks
hoax
something intended to decieve
logic bomb
an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer
phishing
to make someone a victim
pyramid schemes
.
RDF summary
.
tagging
any loosely attached part of something
teleconferencing
a business meeting, educational session, etc., conducted among participants in different locations via telecommunications equipment.
time bomb
a bomb constructed to destroy at a certain time
Trojan Horse
a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
urban legend
a story that grows in exaggeration the more it is told
virus
a segment of self replicating code that damages a network or software
worm
a type of computer virus