Java Games: Flashcards, matching, concentration, and word search.

Lesson 26 Communications and Collaboration Vocabulary

3E

AB
Biometric Security MeasuresA technique or device that examines a fingerprint, voice pattern, or the iris or the retrina of the eye.
FilteringA process that can be used to cut down or eliminate most junk mail.
FraudSomething intended to deceive; deliberate trickery intended to gain an advantage.
HoaxAn attempt to deceive an audience into believing that something false is real.
Logic BombComputer virus triggered by the appearance of disappearance of specified data.
NetiquetteRefers to good manners and proper behavior when communicating through electronic mail.
PhishingType of personal information scams.
Pyrmaid SchemesAn illicit business model where profits are based on the investors' ability to recruit more individuals who are enrolled to make payments to their recruiters.
RDF SummaryA format orginally developed to facilitate the syndication of news articles.
TaggingThe practice of adding keywords to content to simplify searching.
TeleconferencingTelecommunication service in which parties in remote locations can participate via telephone in a group meeting.
Time BombComputer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
Trojan HorseComputer virus that does something different from what it is expected to do.
Urban LegendA story which could have been partially true, but has grown from constant retelling into a mythical yarn.
VirusA computer program that is written to cause corruption of data.
WormComputer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.


Ms.
Broadmoor High School
Baton Rouge, LA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities