Java Games: Flashcards, matching, concentration, and word search.

1.03 Ethics & Security - MAWD

AB
NetiquetteNetwork etiquette.
PiracyThe illegal copying of software.
VirusA program designed to reproduce itself by copying itself into other programs stored on a computer without the user's knowledge.
Computer Ethics"Applied professional ethics dealing with ethical problems aggravated
ACMAssociation for Computing Machinery
Information AgeDue to the computer's ability to store and manipulate large amounts of information.
Online profilingMarketing technique where data is collected about customers visiting a website.
CookieA text file created by the server computer when a user enters information into a website.
Web BeaconsTiny
Privacy PolicyLegally binding document that explains how any personal information will be used.
ErgonomicsThe science that studies safe work environments.
Acceptable Use PolicyDocument that outlines appropripate use for computers
CopyrightProtection of digital information.
WormVirus program that is able to reproduce itself over a network.
Trojah HorseVirus program that appears as something else.
Antivirus programsInstall on computers to detect and remove code before it can be replicated or damage data.
HackingIllegally gaining access to large computer systems to perform acts of vandalism.
PhishingAct of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities