Java Games: Flashcards, matching, concentration, and word search.

2.02 BCT Computer Crime, Security, Ethics Variety

AB
computer crimea criminal act committed through the use of a computer
computer fraudillegal conduct that involves the manipulation of a computer or data
hackinginvading someone's computer without their knowledge
data diddlingchanging data before or after it's been entered into a computer
piracymaking unathorized copies of software
site licenseused to purchase the right to load software on many computers
public domain softwarenoncopyrighted software that may be copied and distributed for free
sharewarecopyrighted software that can be used for free but usually requires a fee at some point
freewarecopyrighted software that can be copied and distributed free
virussoftware program written to cause the corruption of data
wormvirus that copies itself as it works its way through a computer
time bombvirus that is activited at a certain date/time
logic bombvirus that is activated by the appearance or disappearance of certain data
hoaxdisguised as a virus to trick users into thinking they have a virus
trojan horsevirus that does something that it is not expected to do
patentthe exclusive right to a software program so it can not be recreated
antivirus softwareprogram that searches for viruses and destroys viruses
firewallsdesigned to prevent unauthorized access to a computer
ethicsa set of principals based on moral conduct
computer ethicsusing the computer for the betterment of society


Wakefield Middle School
Raleigh, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities