Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
Cell
|
the intersection of a single row and a single column
|
|
Gridlines
|
Nonprinting lines that display on the screen to show the boundary lines of a table
|
|
Merging cells
|
Converting two or more cells into a single cell
|
|
Splitting cells
|
Converting a single cell into two or more cells
|
|
Biometric security measures
|
security tools that use a fingerprint, voice patten, or the iris or retina of the eye to identify a person
|
|
Computer crime
|
a criminal act that is committed through the use of a computer, like getting into someone else's system and changing information or creating a computer virus and causing it to damage information on others' computer
|
|
Computer fraud
|
conduct that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, or value or to cause loss
|
|
Data diddling
|
Act of changing data before it is entered in the computer or after it has been entered
|
|
Hacking
|
Act of invading someone else's computer, usually for personal gain or just the satisfaction of being able to do it
|
|
Logic bomb
|
Computer virus that is triggered by the appearance or disappearance of specified data
|
|
Time bomb
|
computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
|
|
Trojan horse
|
Computer virus that does something different from what it is expected to do
|
|
Virus
|
computer program that's written to cause corruption of data
|
|
Worm
|
type of computer virus that makes many copies of itself resulting in the consumption of system recources, thus slowing down or actually halting tasks.
|