Java Games: Flashcards, matching, concentration, and word search.

Web Ethics & Safety

iCEV

AB
Cyberbullyinguse of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Online Predatoradult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or other abusive purposes
Sextingcreation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic device
Computer Viruscomputer program which replicates and spreads itself from one computer to another
Botnetcollection of computers controlled by users other than their owners to perform automated tasks over the Internet
Social Engineering Vectormethod through which hackers can gain access to a computer
Hackeroriginally refers to someone who is an expert at computer programming and who is able to solve computer problems, but also means someone who illegally gains access to others’ computer for their own profits
Identity Theftcrime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain
E-mail Scamfraud which involves stealing personal information for financial gain through e-mail
Routercomputer device which forwards data packets from one network to another
Network Switchnetwork controller which connects network devices and allows effective communication between these devices
Firewallsoftware designed to protect computers from viruses
Intrusion Detection Systemdevice which monitors network activities for malicious attacks and produces reports to a management station
Virtual Private Networksecurity component which encrypts data and keeps it private within a public network
Intellectual Propertyownership of any creative work or invention
Copyrightgranted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
Piracyunauthorized reproduction or distribution of copyrighted materials, information or production
Fair Useexception to copyright infringement
Plagiarismuse of other people’s words, thoughts or ideas without crediting the source
Session cookiesTemporary cookies and will only be stored in the memory of the browser while it is open
Persistent cookiesUtilized over a much longer period and are tagged with an expiration date by the issuer
First-party cookiesCreated by the domain a web user is visiting and helps a website carry out common functions
Third-party cookiesCreated by a site a user is not currently visiting and is commonly used to track a user who has clicked on an advertisement creating a link between the user and the domain which is referred to them


All Things Business
Red Oak High School
Red Oak, TX

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities