Java Games: Flashcards, matching, concentration, and word search.

Societal/Ethical Issues Vocabulary

AB
Acceptable Use PolicyA set of rules and guidelines that are set up to regulate Internet use and to protect the user.
Antivirus SoftwareAn application designed to search for viruses and repair files on a computer.
BombA destructive computer virus that has a trigger to act based on a predetermined event or date.
Computer VandalismThe intentional act of destroying computer files or computer networks.
Computer VirusA computer program designed to damage computer files.
Computer/Cyber Crimeany criminal act dealing with computers and networks (called hacking). Additionally, it also includes traditional crimes conducted through the Internet. (Hate crimes; identify theft, Internet fraud, etc.)
Computer EthicsThe standards of honesty, morality, and fairness as related to computers.
Computer FraudUsing the computer to deceive or trick someone for profit or to gain dishonest advantage.
Copyright LawsThe legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work. Abbreviated as (c) or ©.
Fair Use PolicyA provision of the Copyright law that gives students and teachers the right to use copyrighted materials for educational purposes without asking the author for permission. They may also copy a small amount of work (being sure to give credit to the author) for reports or lessons.
FreewareSoftware that is given away free of charge, but who's author still holds the copyright.
HackingThe unauthorized use or access to a computer system or computer files.
HoaxA program intended to scare users into thinking they have a computer virus. Carries the same punishment as actually sending a Computer Virus.
Intellectual PolicyIdeas put into actions, such as writings, music, art, or computer codes that are be protected under the copyright laws.
MalwareShort for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.
Open Source/Public Doamain SoftwareApplication software for which the underlying programming language is open for others to access. This allows the program to be changed by other programmers to meet other needs of the users. (This is the opposite of proprietary software.)
PasswordA secret series of characters that enables a user to access a file, computer, or program and provides security and protection from others accessing your information.
Private DataInformation that is personal, such as your name, phone number, home address, e-mail address, social security #, credit card #’s, etc. This information needs to be protected because it can be exploited for business or even criminal intent.
SharewareSoftware that can be tried before you purchase.
Proprietary SoftwareApplication software for which the underlying programming language is protected by the software developer/owner so that others cannot modify it for other purposes. (This is the opposite of OPEN SOURCE software.)
Software LicenseA Legally binding agreement that states how one legally use the software they have purchased.
Software PiracyThe illegal copying and distribution of copyright protected software.
SpywareAny software that secretly gathers information through the user's internet connection without the user's knoweldge, usually for advertising purposes.
Trojan HorseA computer virus disguised as a useful piece of software.
UnethicalNot conforming to acceptable standards of conduct related to honesty, morality or fairness.
WormA computer virus that bores its way through a computer's file or network, reporducing itself and consuming the computer's resources and data.


Brawley Middle School
NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities