Upgrade to remove ads
Vocabulary Terms for ICT 1 Internet Ethic Lesson. Comp. 1
Terms in this set (33)
a computer program that is usually hidden within another seemingly harmless program and that produces copies of itself and inserts them into other programs and usually performs a malicious action as destroying data.
the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.
the unauthorized use of another's production, invention, or conception especially in infringement of a copyright.
a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly.
computer hardware or software that prevents unauthorized access to private data by outside computer users.
unsolicited usually commercial email sent to a large number of addresses
a legal statement which indicates the terms under which a user may make use of a software product.
the process of copying data, software or other digital information on a separate media in addition to its original storage.
to retrieve a file from back up. If a file has been accidentally erased or corrupted, it can be restored if there is a backup.
the application of scientifically proven methods to gather, process, interpret, and use digital evidence to provide a description of cyber crime activities.
a person who illegally gains access to and sometimes tampers with information in a computer system.
a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.
a small data file that certain web sites write to your hard drive when you visit them. A cookie file can contain information such including a user ID that the site uses to track the pages you've visited. But the only personal information a cookie can contain is information you supply yourself.
is a range of abstract materials -- commonly referred to as intellectual property -- which are not owned or controlled by anyone. The term indicates that these materials are therefore "public property", and available for anyone to use for any purpose.
the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something such as a literary, musical, or artistic work.
is when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is "hacking"
a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host..
the translation of data into a secret code. It is the most effective way to achieve data security.
program that detects and removes computer viruses.
a form of software that collects information about the user in order to display advertisements in the web browser based on the information it collects from the user's browsing patterns
Adware (advertising-supported software)
any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.
Stealing and passing off as one's own: using without crediting the source.
any criminal act dealing with computers and networks (called hacking). It also includes crimes conducted through the internet.
a usually small self-contained and self-replicating computer program that invades computes on a network and usually performs a destructive action.
a program that appears to be useful and harmless, but which has harmful side effects such as destroying data or breaking security on the system on which it is run.
a means of disabling a system's security which is deliberately left by designers of the system, often to give access to service technicians or maintenance programmers.
involve right and wrong; relates to issues of right and wrong and how individual people should behave
governs the usage or redistribution of copyright protected software
a license to use software on multiple computers (like in a school lab or a business)
the author (owner) will let you download it, and if you like it and want to use it, you are expected to pay a fair price for it
software you can download and use for free
if you use copyrighted material in a report or project you should always give credit to the author or illustrator of work you are using (examples—when you use a photograph from the internet, a quote from a book)
THIS SET IS OFTEN IN FOLDERS WITH...
Parts of a computer
Keyboarding and Word Processing
YOU MIGHT ALSO LIKE...
Information Literacy: Ethics
CIS Chapter 10
Computers chapter 5
Chapter 5: CPT
OTHER SETS BY THIS CREATOR
Dog Words 4/8-4/12
Dog Words 4/1 - 4/5
Dog Words ( 3/26-3/29)
Dog Words (3/18-3/21)