• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Security tools that use a fingerprint, voice pattern, or the iris or retina of the eye to identify a person
Biometric security measures
A criminal act that is commited through the use of a computer, like getting into someone else's system and changing information or creating a computer virus and causing it do damage information on others' computers
Computer crime
Conduct that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, or value or to cause loss
Computer fraud
Act of changing data before it is entered in the computer or after it has been entered
Data diddling
Act of invading someone else's computer, usually for personal gain or just the satisfaction of being able to do it
Hacking
Computer virus that is triggered by the appearance or disappearance of specified data
Logic bomb
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
Time bomb
Comptuer virus that that does somethign different from what it is expected to do
Trojan horse
Computer program that's written to cuase corruption of data
Virus
Type of computer that makes many copies of itself resulting in the consumption of system resources, thus slowing down or actually halting taks.
Worm