• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

What are the three primary privacy issues?

Accuracy, Property, and Access.

To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):

Reverse directory.

Browsers store the locations of sites visited in a:

History File.

The browser mode that eliminates history files and blocks most cookies.

Privacy.

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:

Online Identity.

Computer criminals who create and distribute malicious programs are known as:

Crackers.

Programs that come into a computer system disguised as something else are called:

Trojan Horses.

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

Cyber-bullying.

Special hardware and software used to control access to a corporation’s private network is known as a(n):

Firewall.

To prevent copyright violations, corporations often use:

DRM.