Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
acceptable use policy
|
a set of rules specifying legal and ethical system use and activities and the consequences of noncompliance.
|
|
Adware
|
is a form of spyware that collects information about the user (without the user’s consent) to display advertisements in the Web browser, based on information it collects from the user’s browsing patterns.
|
|
Cookies
|
are small text files with a unique ID tag which is embedded in a Web browser and are saved on the user’s hard drive.
|
|
Cybersquatting
|
is registering, selling, or using a domain name to profit from someone else’s trademark.
|
|
digital divide
|
Information technology and the Internet have created a digital divide. Computers still aren’t affordable for many people. The digital divide has implications for education.
|
|
Intellectual property
|
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses.
|
|
Keyloggers
|
monitor and record keystrokes and can be software or hardware devices.
|
|
Log files
|
which are generated by Web server software, record a user’s actions on a Web site.
|
|
Phishing
|
is sending fraudulent e–mails that seem to come from legitimate sources, such as a bank or university, for the purpose of capturing private information, such as bank account numbers or Social Security numbers.
|
|
Spam
|
is unsolicited e–mail sent for advertising purposes.
|
|
Spyware
|
is software that secretly gathers information about users while they browse the Web.
|
|
Virtual organizations
|
are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.
|