Java Games: Flashcards, matching, concentration, and word search.

1.03

AB
Computer Ethicsapplied professional ethics dealing with ethical problems aggravated, transformed or created by computer technology
ACMAssociation for Computing Machinery
Information AgeDue to the computer’s ability to store and manipulate large amounts of information
NetiquetteDo not attempt to access the account of another user without authorization
PrivacyEthical issue Computers record transactions, calls, etc. These records can be used to learn a lot about you. Because of privacy issues, many laws have been passed
Online profilingMarketing technique where data is collected about customers visiting a website
CookieText file created by the server computer when a user enters information into a website.
Web beaconsTiny, transparent graphics located on web pages or in e-mail message that are used in combination with cookies to collect data about web page users or email senders
Privacy PolicyLegally binding document that explains how any personal information will be used.
Identity Theft Penalty Act of 2004Establishes penalties for aggravated identity theft Prohibits a court from giving parole, reducing any sentence or for providing for concurrent terms of imprisonment
FISMAFederal Information Security Management Act of 2002 Requires federal agencies to develop, document and implement an agency-wide program to provide information security.
Consumer Credit Reporting Reform ActAmended the Fair Credit Reporting Act (FCRA) of 1970 Addresses data collection by credit, insurance and employment agencies Gives individuals the right to see information maintained about them Restricts who may access credit files to only those with a court order or the written permission of the individual whose credit is being checked.
Privacy Act of 1974Restricts the way in which personal data can be used by federal agencies Individuals must be permitted access to information stored about them and may correct any information that is incorrect. Agencies must insure both the security and confidentiality of any sensitive information.
Right to Financial Privacy Act of 1978Requires government authorities have a subpoena, summons or search warrant to access an individual’s financial records When records are released, the financial institution must notify the individual of who has had access to them.
ECPAElectronic Communications Privacy Act of 1986 . Makes it a crime to access electronic data without authorization Prohibits unauthorized release of such data
Electronic Freedom of Information Act of 1996Requires federal government agencies to make certain agency information available for public inspection Designed to improve public access to agency records
COPPAChildren’s Online Privacy Protection Act of 1988 .Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent.
SAFESafety and Freedom through Encryption Act of 1999. Gives Americans the freedom to use any type of encryption to protect their confidential information. Prohibits the government from monitoring people’s communications without their knowledge or consent.
PATRIOTProvide Appropriate Tools Required to Intercept and Obstruct Terrorism.
ErgonomicsThe science that studies safe work environments. Repetitive stress injuries, eye strain, etc.
CopyrightProtection of digital information NET (No Electronic Theft) Act of 1997 Protects against copyright infringement
PiracyIllegal copies being distributed
VirusProgram or series of instruction that can replicate without the user’s knowledge
Trojan HorseAppears as something else
WormProgram that is able to reproduce itself over a network
Antivirus programsInstall on computers to detect and remove code before it can replicated or damage data
Crackers or HackersIllegal act to gain access to large computer systems to perform acts of vandalism. Electronic Communications Privacy Act of 1986 makes it a federal offense. Most networks have a firewall to prevent this type of access.
PhishingAct of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities