Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
The ownership of creative work.
|
COPYRIGHT
|
|
Copying without citing the source is called what?
|
PLAGIARIZING
|
|
What do you purchase in order to have the right to use software?
|
SITE LICENSE
|
|
When purchasing software, you may make one copy of the software for what purpose?
|
BACK UP COPY
|
|
The safe responsible use of a computer.
|
COMPUTER ETHICS
|
|
Safe passwords usually include what two things?
|
NUMBERS AND LETTERS
|
|
True or False - Passwords should include things like your name, birthdate, or other information common about yourself.
|
FALSE - Passwords should not be common information that someone might know about you.
|
|
A safe practice is to always do what when you leave a computer?
|
CLOSE BROWSER AND LOG OUT
|
|
If you find a CD of personal information left in the classroom, what should you do with the CD?
|
GIVE IT TO YOUR TEACHER
|
|
In copyright law, the reproductionof a small portion of copyrghted material which does not require the permission of the copyright holder.
|
FAIR USE
|
|
The illegal use of the computer.
Example: The illegal copying of software for distribution within the organization or to friends, clubs and other groups or for commercial duplication and resale. |
PIRACY
|
|
The safe and responsible use of the computer.
|
COMPUTER ETHICS
|
|
A set of rules and guidelines that are set up to regulate Internet use and to protect the user such as a school's rules for Internet use.
|
ACCEPTABLE USE POLICY
AUP |
|
What must you do even if you paraphrase someone's creative work?
|
CITE THE SOURCE
|
|
A concept in copyright law that allows limited use of copyright material without requiring permission from the rights holders.
|
FAIR USE
|
|
What legal guidelines allow educators to use certain copyrighted materials to a limited degree in the classroom?
|
FAIR USE
|
|
The illegal use of the comptuer such as illegally copying software for distribution.
|
PIRACY
|
|
An unauthorized person who secretly gains access to comptuer files, often for the purpose of obtaining information and/or to cause damage.
|
HACKER
|
|
A program disguised to perform a useful function, but is there to infiltrate computers and networks illegally.
|
TROJAN HORSE
|
|
A computer program that attaches to a file and spreads from one compuer to another.
|
COMPUTER VIRUS
|
|
What are 3 potential sources of viruses?
|
DOWLOADING FILES FROM THE INTERNET
USING PORTABLE STORAGE DEVICES OPENING EMAIL ATTACHMENTS |
|
A comptuer file designed to do damage that goes through a computer and possibly a network. When it gets into your comptuer it copies itself until it shuts down the computer.
|
WORM
|
|
Short for malicious software, is designed specifically to damage or disrupt a system such as a virus or a Trojan horse.
|
MALWARE
|
|
Software that self-installs on computers and tracks the user's Internet use, mainly for marketing purposes.
|
SPYWARE
|
|
A form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user ID's and passwords.
|
PHISHING
|
|
The practice of using someone else's work or ideas as your own.
|
PLAGIARISM
|
|
What are 3 types of online protection?
|
FIREWALL
VIRUS PROTECTION ENCRYPTION |
|
A system designed to prevent unauthorized access to or from a private network.
|
FIREWALL
|
|
A program which is loaded on a computer/network to protect codes which causes viruses from bein loaded onto your comptuer without your knowledge and running against your wishes.
|
VIRUS PROTECTION
|
|
The translation of data into a secret code to achieve data security.
|
ENCRYPTION
|
|
A procedure that makes the contents of a message or file unintelligible to anyone not authorized to read it.
|
ENCRYPTION
|