Java Games: Flashcards, matching, concentration, and word search.

Computer Social and Ethical Issues

Use of the Internet and implications, acceptable guidelines for Internet usage and ethics, and issues and laws governing the use of the Internet.

AB
CopyrightedSoftware can be copied for backup purposes only.
Public DomainSoftware can be feely copied and is distributed free to everyone.
Freeware/SharewareSoftware distributed on a trial basis and you are expected to pay a small fee in order to keep it.
Web Copyright Law of 1997Protects material published on the Internet and copyrighted if the value of the work is greater than $1000.
Copmputer Fraud and Abuse Act of 1986 (CFAA)Stealing passwords or hacking into a network in order to steal information, commit fraud or inflict intentional damang is illegal.
Safety and Freedom through Encryption ActAllows US citizens to protect their own material using encryption techniques but makes it a Federal crime to use this technology to conceal a crime.
SniffersPrograms that lurk in cyberspace and intercept messages containing specific text.
WormPrograms designed to enter a computer network, spread and reproduce.
Trojan horsePrograms disguised to perform a useful function but instead can cause damage and infiltrate a network.
MichaelangeloActivated on a specific date, March 6, 1994, and was spread through infected floppy disks.
VirusSoftware that is created to intentionally destroy data.
EncryptionTechnology that scrambles information so that only the sender and receiver can read it.
BombType of virus that activates on a particular date.
MelissaSpecific virus spread through e-mail attachments and was harmful in that it flooded the Internet stopping the flow of activiity.
InternetElectronic highway connecting millions of computer and individauls worldwide.
PasswordsPersonal security codes which allow you to access online accounts.
SYSOPAcronym for systems operator.
Privacy RightsVary tremendously depending on the identiy of the intruder.
BackupA separate copy of your work.
Macro virusVirus spread among different operating systems transmitted in a Microsoft Word document.


Canyon Springs High School
NV

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities