14 terms

Grade 9 Computers and Society Review

"spoofed" emails and fraudulent websites designed to fool recipients into divulging person financial data such as credit card numbers, account usernames and passwords
process of encoding information in a way so that only someone with a key can decode it
allow websites to store a small amount of data on the users systems
barriers that are situated between the internet and your local network - a filter for an Interent connection
people who attempt to get unauthorized access to the target computer or restricted data and view, compromise or exploit its contents
can track the keys that are typed with hardware and software, powered by electronic and acoustic methods
Code of ethics
provides norms and principles to the computer users and system professionals
Software piracy
to make copies of single-user license programs
representing someone else's work as your own
software that performs certain behaviors, like changing your Web browser's home page or search page without appropriately obtaining your consent first
Biometric data
this is used to uniquely identify people, including fingerprints
Antivirus software
a computer program that detects, prevents, and takes action to remove malware
Identify theft
when one person uses another person's personal information which allows them to pretend that they are that person - do this in order to steal money or get other benefits
Effective passwords
14 characters or longer, lots of variety, uses the entire keyboard