Java Games: Flashcards, matching, concentration, and word search.

CT S 5 Responsible Use of Technology

AB
NetiquetteThe manners people use in electronic communications
FlamingUsing obscene or angry language
Shouting in EmailsTyping in all capital letters
DOS Attacks (Denial of Service)When someone uses various computer tricks to overload and eventually shut down a company’s Web site
CrackersSomeone who steals information or breaks down software’s security protections to destroy computer systems
HackersSomeone who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage
Digital PiratesThe unauthorized manufacturing and selling of works that are copyrighted
VirusesA program intentionally designed to cause annoyance or damage to computer hardware or software
Worm VirusA virus that looks like a program which uses a computer to host and reproduce the virus, which then travels over the computer network to infect all workstations it can
Trojan Horse VirusA virus that looks like a program which performs a useful task while at the same time carrying out some secret destructive act of sabotage
Time Bomb VirusA type of Trojan horse virus that watches the clock and is activated on a certain date or certain time of the day
Computer VirusSoftware that spreads a problem from program to program or from disk to disk, and uses cache infected programs or disks to make more copies to itself
Logic Bomb VirusA program designed to attack in response to a particular logical event or sequence of events
File VirusA virus that attaches to an application program
Boot sector VirusA virus that infects the system files that your computer uses every time it is turned on
Macro VirusA virus that is transmitted through macros embedded in documents and usually spread via email
MalwareA type of software, script of code designed to disrupt a computers operation by gathering sensitive information, or gaining unauthorized access to the computer systems
SpywareA type of software that self-installs on a computer, enabling information to be gathered about a person's Internet use, passwords, etc.
Antivirus SoftwareA type of software used to prevent, detect, and remove malware or a harmful viruses like: worms, trojan horses, etc.
AttachmentsA way to send files, pictures, documents, etc. via email that can be susceptible to having a virus
FirewallA software program that acts as a barrier between a computer and the internet to protect the computer from unauthorized access
EthicsThe principles and standards we use to decide how to act
RulesSpecific guidelines about appropriate use of computers
AUP (Acceptable Use Policy)The rules for safe and proper use of the computer at your school
LawsRegulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources
Privacy LawsOnline privacy – describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access
Intellectual PropertyIntangible property that is created by someone’s creativity and intellectual effort
CopyrightThe legal protection for intellectual property
TrademarkA name, symbol or something that stands for something else, or other features that identifies a product with a specific owner
PermissionAsking an owner or creator of a work if you can use their work in a way that it was not intended for
Faire UseTimes when you may use a copy of a copyrighted work without asking for permission
Public Domain SoftwareThis software has no owner and is not protected by copyright law
Freeware SoftwareThis is a copyrighted software that is licensed to be copied and distributed without charge
Shareware SoftwareThis software is licensed for copying and sharing for a trial period, but payment must be made to the owner for permanent use
Open Source SoftwareThis software may be sold or distributed free of charge in complied form, but it must, in every case, also include the source code
All Rights Reserved SoftwareThis software may be used by the purchaser according the exact details spelled out in the license agreement

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities