• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back
The ownership of creative work.
COPYRIGHT
Copying without citing the source is called what?
PLAGIARIZING
What do you purchase in order to have the right to use software?
SITE LICENSE
When purchasing software, you may make one copy of the software for what purpose?
BACK UP COPY
The safe responsible use of a computer.
COMPUTER ETHICS
Safe passwords usually include what two things?
NUMBERS AND LETTERS
True or False - Passwords should include things like your name, birthdate, or other information common about yourself.
FALSE - Passwords should not be common information that someone might know about you.
A safe practice is to always do what when you leave a computer?
CLOSE BROWSER AND LOG OUT
If you find a CD of personal information left in the classroom, what should you do with the CD?
GIVE IT TO YOUR TEACHER
In copyright law, the reproductionof a small portion of copyrghted material which does not require the permission of the copyright holder.
FAIR USE
The illegal use of the computer.
Example:
The illegal copying of software for distribution within the organization or to friends, clubs and other groups or for commercial duplication and resale.
PIRACY
The safe and responsible use of the computer.
COMPUTER ETHICS
A set of rules and guidelines that are set up to regulate Internet use and to protect the user such as a school's rules for Internet use.
ACCEPTABLE USE POLICY

AUP
What must you do even if you paraphrase someone's creative work?
CITE THE SOURCE
A concept in copyright law that allows limited use of copyright material without requiring permission from the rights holders.
FAIR USE
What legal guidelines allow educators to use certain copyrighted materials to a limited degree in the classroom?
FAIR USE
The illegal use of the comptuer such as illegally copying software for distribution.
PIRACY
An unauthorized person who secretly gains access to comptuer files, often for the purpose of obtaining information and/or to cause damage.
HACKER
A program disguised to perform a useful function, but is there to infiltrate computers and networks illegally.
TROJAN HORSE
A computer program that attaches to a file and spreads from one compuer to another.
COMPUTER VIRUS
What are 3 potential sources of viruses?
DOWLOADING FILES FROM THE INTERNET

USING PORTABLE STORAGE DEVICES

OPENING EMAIL ATTACHMENTS
A comptuer file designed to do damage that goes through a computer and possibly a network. When it gets into your comptuer it copies itself until it shuts down the computer.
WORM
Short for malicious software, is designed specifically to damage or disrupt a system such as a virus or a Trojan horse.
MALWARE
Software that self-installs on computers and tracks the user's Internet use, mainly for marketing purposes.
SPYWARE
A form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user ID's and passwords.
PHISHING
The practice of using someone else's work or ideas as your own.
PLAGIARISM
What are 3 types of online protection?
FIREWALL

VIRUS PROTECTION

ENCRYPTION
A system designed to prevent unauthorized access to or from a private network.
FIREWALL
A program which is loaded on a computer/network to protect codes which causes viruses from bein loaded onto your comptuer without your knowledge and running against your wishes.
VIRUS PROTECTION
The translation of data into a secret code to achieve data security.
ENCRYPTION
A procedure that makes the contents of a message or file unintelligible to anyone not authorized to read it.
ENCRYPTION