A | B |
shift | hold this key AND delete to completely erase email |
replicate | trojan horses are unable to do this-unlike viruses or worms |
reputable | games and software should only be downloaded from these companies |
trojan horse | codes that claim to do one thing but do something else |
virus | harmful program that piggybacks on others |
worms | harmful items that use a computer network to spread |
malicious code | programs written for bad or destructive purpose |
program | written instruction in a computer language |
exe | one common virus extension |
vbs | file extension that stands for visual basic |
steganography | technology that allows people to embed or hide data inside of other files like documents, pictures, or music files |
hacking | process of breaking into a computer network |
extension | explains the purpose of a file |
spam | sending out mass mailings |
flame | mail designed to make another person mad |
netiquette | rules to follow when working online |
file extension | string of letters at the end of a file name that identifies the file type |
spim | spam delivered through Instant Messaging |
hoax | attempt to fool someone by sending a false email |
phishing | email sent pretending to be from a real business asking for personal information |
malware | another name for spyware and adware-information can be sent to others about what you are doing online and send pop-up ads to your screen |
attachment | file attached to an email-can be a document, picture, or a program |