Internet Unit Terms
Terms in this set (...)
Property of the mind including ideas, inventions and creations such as art and music.
Harassment, taunting, and teasing committed online, such as in chat rooms or by posting inappropriate or false information or images of someone.
Internet security software and/or hardware that protects your computer against unauthorized access.
Tricking users into providing information such as passwords and bank account numbers by way of emails.
Copying or using someones else's work and taking credit for it without acknowledging the real author.
Malicious software that enters a computer and tracks or gathers personal information without the users knowledge.
Computer program that appears to be a helpful or harmless application, but actually causes damage to a computer once downloaded.
Malicious software that enters a computer and negatively affects that computer's ability to run correctly.
An owner's the exclusive legal right to reproduce, publish, sell, or distribute their own original work.
A small file downloaded by websites to store information on your browser.
File Sharing programs
P2P programs that allow users to access the same file at the same time.
Sending a deliberately confrontational message to others on the internet.
Electronic version of a file.
Courtesy, honesty, and polite behavior practiced on the internet.
Manipulation of a minor to gain their trust for illegal behavior.
Illegally copying copyrighted software, music or movies.
The fraudulent use of another's personal information, usually for financial gain.
Allows for educational use of copyrighted material.
A program that records every key struck o n a keyboard and sends that information to an attacker.
A type of malware that holds the victim's computer files hostage. An encrypted code must be bought to free the files.
The amount of data that can pass through a network or part of a network per second.
Multiple computers on a network that are infected with a program that can be controlled remotely.
Distributed Denial of Service Attack. Attempts to make a website unavailable by overwhelming it with a flood of traffic.
A fictional virus modeled after Stuxnet. It can damage the physical infrastructure of a computer.
The process of using codes to make readable information unreadable.
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Knowing the "right" and "wrong" of technology usage.
Unit 2 - 7th period
Internet Unit Terms - Part 1
PP117AC WIKI POLICIES
Activity 02: Cloud and Web 2.0 concepts