Java Games: Flashcards, matching, concentration, and word search.

3.00 CSA2 Computer Security and Privacy Terminology Review Games

AB
Active ContentSmall program that gets installed on a computer while browsing the Internet. The basic function is to provide an interactive Internet experience through videos and toolbars. Sometimes is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it.
Back UpTo make a duplicate copy of a program, a disk, or data.
Cache MemoryTemporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet.
Computer PrivacyKeeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission.
Computer SecurityThe protection of a computer system and its data from accidental or intentional loss and tampering.
CookieA small file on a computer that is created when a user visits a Web site. A Web site uses this to identify users who visit the site, and also track the preferences of the users.
CopyrightA method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law.
CyberbullyingIs when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.
DecryptionThe process of reconverting the encrypted data into a readable and usable form.
EncryptionThe process of converting data into an unreadable and unusable form. Is done to prevent unauthorized access of data, especially during data transmission over the Internet.
FirewallA filter that blocks unreliable information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. Also helps to ensure computer privacy by restricting external access by any unauthorized user.
HackerA person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer.
Intellectual PropertyAny information available on the Internet which is legally owned by the person who created it. The owner has the exclusive rights to control the use of this information.
Internet Service Provider (ISP)A company that provides Internet connectivity to individuals, businesses, and organizations.
LibelWritten defamation that has been published. Punishable offense.


CTE Instructor
Fuquay Varina Middle School
Fuquay-Varina, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities