Java Games: Flashcards, matching, concentration, and word search.

IS 09 Computer Social and Ethical Issues 2

AB
EncryptionTechnology that scrambles information so that only the sender and receiver can read it.
SniffersPrograms that lurk in cyberspace and intercept messages containing specific text.
WormPrograms designed to enter a computer network, spread and reproduce.
Trojan horsePrograms disguised to perform a useful function but instead can cause damage and infiltrate a network.
MichaelangeloActivated on a specific date, March 6, 1994, and was spread through infected floppy disks.
VirusSoftware that is created to intentionally destroy data.
BombType of virus that activates on a particular date.
MelissaSpecific virus spread through e-mail attachments and was harmful in that it flooded the Internet stopping the flow of activiity.
BackupA separate copy of your work.
Macro virusVirus spread among different operating systems transmitted in a Microsoft Word document.


Business Instructor
Belleville East High School
Belleville, IL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities