Java Games: Flashcards, matching, concentration, and word search.

Social Aspects of Computing

AB
Denial of Service Attackmass emails flood a target site to bring it down
VirusA program that attaches itself to other programs
Trojan HorseA program appears to be useful, but actually is destructive
SpywareA program that secretly collects information
CybercrimeOn-line illegal acts
SpamBulk advertising email
ID TheftObtaining personal information in order to impersonate someone else
FirewallA device that limits Internet access into and out of a network
ZombieComputer that a hacker uses to send emails through
Intellectual PropertyUnique and original works
NetiquetteThe code of acceptable behaviour on the Internet
TechnophobiaFear of modern technology
EncryptionThe conversion of a message into a secret code
Digital DivideThe gap between those who have access to the Internet and those who don't
HackerSomeone who gains unauthorised access to a computer system
ErgonomicsThe study of designing computer equipment for health and safety
Open Source SoftwareSoftware that is freely available to anyone
TelecommutingWorking from home using a pc
PatchA minor change to correct a program
E-commerceBusiness transactions over the Internet


Mr Calder

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities