Java Games: Flashcards, matching, concentration, and word search.

Maida - Internet Safety

AB
trojansPrograms that look useful, but actually cause damage to your computer.
spamAny unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.
virusesSelf-replicating programs that damage hard drives and affect the normal operation of your computer
phishingFake e-mails that appear to come from a legitimate source looking to “verify” personal or financial information.
cyberbullyingUse of Internet technologies to tease, humiliate, and harass someone. Or, the use of technology to spread rumors and gossip, post pictures without consent, steal passwords to assume someone else's identity, threaten or harass with offensive language.
blogan online journal or diary
groomingtrying to gain your trust by making promises, sending you gifts or offering you affection and attention.
cookieA piece of information about your visit to a website that some websites record automatically on your computer. By using these, a website operator can determine a lot of information about you and your computer.
cybercrimeAny internet-related illegal activity.
cyberstalkingMethods individuals use to track, lure, or harass another person online.
electronic footprintcomputers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
file sharingThis software enables multiple users to access the same computer file simultaneously. File sharing sometimes is used illegally to download music or software.
flameA hostile, strongly worded message that may contain obscene language.
identity theftIn this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone’s identity.
malwarestands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information.
pharmingA scheme that sends you to fake websites where hackers secretly collect personal information and passwords.
netiquetteRules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
spywareMalicious code that secretly watches what you do on your computer and sends the information over the Internet.


Bay City Central High School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities