Java Games: Flashcards, matching, concentration, and word search.

Societal/Ethical Issues Vocabulary

AB
EncryptionThe translation of data into secret code - most effective way to achieve data security.
Antivirus SoftwareAn application designed to search for viruses and repair files on a computer.
BombA destructive computer virus that has a trigger to act based on a predetermined event or date.
SPAMElectronic junk mail - unsolicited email.
Computer VirusA computer program designed to damage computer files.
Cyber CrimeAny criminal act dealing with computers and networks (called hacking). Additionally, it also includes traditional crimes conducted through the Internet. (Hate crimes; identify theft, Internet fraud, etc.)
Computer EthicsThe standards of honesty, morality, and fairness as related to computers.
FirewallTechnology that prevents users from visiting inappropriate web sites and protects the network from unauthorized users.
Trojan HorseA type of computer virus that is disguised as a useful application.
WormA computer program that can reproduce itself. It is designed to damage computer files.
FreewareSoftware that is given away free of charge, but who's author still has the copyright.
HackingThe unauthorized use or access to a computer system or computer files.
HoaxA program intended to scare users into thinking they have a computer virus. Carries the same punishment as actually sending a Computer Virus.
SpywareAny software that secretly gathers user information through the user's Internet connection without their knowledge.
MalwareShort for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.
Identity TheftStealing another peron's personal information (name, Social Security number, credit card number, etc.
PasswordA secret series of characters that enables a user to access a file, computer, or program and provides security and protection from others accessing your information.
PhishingAct of sending an email to a user in an attempt to scam the user into surrendering private information.
SharewareSoftware that can be tried before you purchase.
NetiquetteThe rules of etiquette that apply when communicating over computer networks


CTE Teacher
NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities