Java Games: Flashcards, matching, concentration, and word search.

Ch 10, Computer Confluence, Vocab Review

AB
access-control softwareSoftware that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.
active badgeA microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.
antivirusA program designed to search for viruses, notify users when they're found, and remove them from infected files.
authentication mechanismsComputer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves.
authorization mechanismsComputer network security measures that guarantee that users have permission to perform particular actions.
autonomous systemsComplex systems that can assume almost complete responsibility for a task without human input, verification, or decision making.
backupThe process of saving data-especially for data recovery. Many systems automatically back up data and software onto disks or tapes.
biometricsMeasurements of individual body characteristics, such as a voice print or fingerprint; sometimes used in computer security.
Code of EthicsPolicies and procedures, such as those developed by companies and by organizations such as the ACM (Association for Computing Machinery), to guide the behavior of information workers.
computer crimeAny crime accomplished through knowledge or use of computer technology.
computer securityProtecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.
denial of service (DoS) attackA type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients.
encryptionProtects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it's been reconstructed with a matching key.
ethicsMoral philosophy-philosophical thinking about right and wrong.
hackingElectronic trespassing and vandalism.
identity (ID) theftThe crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards.
logic bombA program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
malwareMalicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.
passwordsThe most common security tools used to restrict access to computer systems.
plagiarismThe act of presenting someone else's work as one's own.
smart weaponA missile that uses computerized guidance systems to locate its target.
social engineeringSlang for the use of deception to get individuals to reveal sensitive information.
spoofingA process used to steal passwords online.
spywareTechnology that collects information from computer users without their knowledge or consent.
Trojan horseA program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
uninterruptible power supply (UPS)A hardware device that protects computers from data loss during power failures.
virusesSoftware that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
wormsPrograms that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.


Chestatee High School
Gainesville, GA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities