Computer Literacy BASICS Vocabulary: Lessons 26-27

Computer Literacy BASICS Vocabulary: Lessons 26-27 Terms

41 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Biometric Security Measures
A high-level method of security that matches a fingerprint, voice pattern, or the iris or retina of the eye to the entry originally stored in the system
Filtering
Process that can be used to cut down on or eliminate most junk mail
Hoax
An attempt to deceive an audience into believing something false is real
Fraud
Dishonestly obtaining money, property, information, or other things of value, or to cause loss.
Logic Bomb
Virus triggered by the appearance or disappearance of specified data
Netiquette
Refers to the good manners and proper behaviors when communicating through electronic media
Phishing
Using e-mail messages for personal information scams
Pyramid Schemes
Illicit business model where profits are based on the investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters
RDF Summary
Format originally developed to facilitate the syndication of news articles and now widely used to share the contents of blogs
Spam
Junk e-mail
Tagging
Used in blogs and other informational sites to simplify the search process
Teleconferencing
A telecommunications system that permits the live exchange and sharing of information between two or more people
Time Bomb
A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
Trojan Horse
A virus that does something different from what it is expected to do
Urban Legend
Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn