Java Games: Flashcards, matching, concentration, and word search.

IDT Unit 2 Vocabulary Review

AB
Netiquettethe rules or guidelines of behavior while on the Internet.
EthicsRefers to the rules and standards governing the conduct of an individual in society
Hackersomeone who seeks information by breaking into computer systems and networks. While this is not legal, the intent is not to harm.
Crackingthis is someone who seeks to cause harm by breaking into secure networks or systems.
Software PiracyCopying Software without paying for it or without getting permission from the owner.
Copyrightrefers to laws that regulate the use of the work of a creator, such as an artist or author. This includes copying, distributing, altering and displaying creative, literary and other types of work
Identity Thefta crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials
Fair Useexceptions and limitations to copyright law that allow the public to use portions of copyrighted material
Plagiarismstealing” someone else’s work and pretending it’s yours. Usually by copying it word for word in a document.
Encryptionsoftware that transforms information into code that can only be read using a key or specialized software
Virusa software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
FirewallA firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Digital Citizenis one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.
Computer Forensicsthe practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally.
Internet Securitya branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems
Spywareprogramming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties (can be used to monitor employee use of computers)
Adwarealso known as advertising supported software is a software package that automatically plays or downloads advertisements to a computer after the software is installed on it or while the application is being used.
Malwareis software designed to damage a computer system without the owner’s knowledge or consent.
Phishingan e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.


Marketing Education & DECA Advisor
Douglas County High School
Douglasville, GA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities