Java Games: Flashcards, matching, concentration, and word search.

Malware Review

AB
shifthold this key AND delete to completely erase email
replicatetrojan horses are unable to do this-unlike viruses or worms
reputablegames and software should only be downloaded from these companies
trojan horsecodes that claim to do one thing but do something else
virusharmful program that piggybacks on others
wormsharmful items that use a computer network to spread
malicious codeprograms written for bad or destructive purpose
programwritten instruction in a computer language
exeone common virus extension
vbsfile extension that stands for visual basic
steganographytechnology that allows people to embed or hide data inside of other files like documents, pictures, or music files
hackingprocess of breaking into a computer network
extensionexplains the purpose of a file
spamsending out mass mailings
flamemail designed to make another person mad
netiquetterules to follow when working online
file extensionstring of letters at the end of a file name that identifies the file type
spimspam delivered through Instant Messaging
hoaxattempt to fool someone by sending a false email
phishingemail sent pretending to be from a real business asking for personal information
malwareanother name for spyware and adware-information can be sent to others about what you are doing online and send pop-up ads to your screen
attachmentfile attached to an email-can be a document, picture, or a program


Technology Literacy-Computer Science
Bel Air Middle School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities