How can we help?
You can also find more resources in our
Select a category
Something is confusing
Something is broken
I have a suggestion
What is your email?
What is 1 + 3?
Grade 9 Computers and Society Review
"spoofed" emails and fraudulent websites designed to fool recipients into divulging person financial data such as credit card numbers, account usernames and passwords
process of encoding information in a way so that only someone with a key can decode it
allow websites to store a small amount of data on the users systems
barriers that are situated between the internet and your local network - a filter for an Interent connection
people who attempt to get unauthorized access to the target computer or restricted data and view, compromise or exploit its contents
can track the keys that are typed with hardware and software, powered by electronic and acoustic methods
Code of ethics
provides norms and principles to the computer users and system professionals
to make copies of single-user license programs
representing someone else's work as your own
software that performs certain behaviors, like changing your Web browser's home page or search page without appropriately obtaining your consent first
this is used to uniquely identify people, including fingerprints
a computer program that detects, prevents, and takes action to remove malware
when one person uses another person's personal information which allows them to pretend that they are that person - do this in order to steal money or get other benefits
14 characters or longer, lots of variety, uses the entire keyboard