How can we help?

You can also find more resources in our Help Center.

14 terms

Grade 9 Computers and Society Review

STUDY
PLAY
Phishing
"spoofed" emails and fraudulent websites designed to fool recipients into divulging person financial data such as credit card numbers, account usernames and passwords
Encryption
process of encoding information in a way so that only someone with a key can decode it
Cookies
allow websites to store a small amount of data on the users systems
Firewall
barriers that are situated between the internet and your local network - a filter for an Interent connection
Hacker
people who attempt to get unauthorized access to the target computer or restricted data and view, compromise or exploit its contents
Keyloggers
can track the keys that are typed with hardware and software, powered by electronic and acoustic methods
Code of ethics
provides norms and principles to the computer users and system professionals
Software piracy
to make copies of single-user license programs
Plagiarism
representing someone else's work as your own
Spyware
software that performs certain behaviors, like changing your Web browser's home page or search page without appropriately obtaining your consent first
Biometric data
this is used to uniquely identify people, including fingerprints
Antivirus software
a computer program that detects, prevents, and takes action to remove malware
Identify theft
when one person uses another person's personal information which allows them to pretend that they are that person - do this in order to steal money or get other benefits
Effective passwords
14 characters or longer, lots of variety, uses the entire keyboard