Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Illegally copying or downloading music, movies, software, or other copyrighted material.
|
Piracy
|
|
a commonly used technique where a user gets “locked” in a website. While surfing the Internet it is possible to click a website and have multiple undesirable websites open. When this happens, you often cannot close or back out of the sites and must close your Web browser completely.
|
Mouse Trapping
|
|
this is a system that creates a special “wall” to keep out unwanted information, like spam and viruses, and unwanted people, like hackers.
|
Firewall
|
|
computer programs that can destroy files or make your computer “crash.” They can be sent by e-mail or through other file sharing programs. Anti-virus software and not downloading information from people you don’t know can help keep viruses from damaging your computer.
|
Virus
|
|
any computer code that is intentionally introduced into a system to damage or destroy files or disrupt the operation of a computer.
|
Malicious Code
|
|
the act of posting content on a Blog
|
Blogging
|
|
when someone takes someone else’s words and using them as their own.
|
Plagiarism
|
|
unwanted e-mail from someone you don’t know.
|
Spam
|
|
an online scam that attacks the browser’s address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals personal information.
|
Pharming
|
|
courtesy, honesty, and polite behavior practiced on the Internet.
|
Netiquette
|
|
a popular term for someone who accesses computer information either legally or illegally.
|
Hacker
|
|
online techniques sexual predators use to get to know their victims in preparation for sexual abuse.
|
Grooming
|
|
Scam involves sending fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
|
Phishing
|
|
Methods individuals use to track, lure, or harass another person online.
|
Cyberstalking
|
|
a variation of chat rooms that allow users to communicate through text messages.
|
Instant Messaging
|
|
Bullying through Internet applications and technologies such as IM, social networking sites, and cell phones.
|
Cyberbullying
|
|
websites use these files to store information on your browser.
|
Cookie
|