29 terms

Unit 2 - 7th period

STUDY
PLAY

Terms in this set (...)

QR Code
a square-shaped coded graphic that corresponds to a web address or other information
Plug-in
special software installed with your with your browser needed in order to listen to an audio file or view a video (ex: Flash Player)
E-Commerce
business transactions that occur over the Internet
Home Page
first page of a website; like a cover of a book
Streaming
process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting (watching a concert online)
Information Privacy
the right of individuals and companies to deny or restrict the collection and use of information about them
Intellectual Property
unique and original works such as ideas, inventions, company logos, and more; the rights to which creators are entitled for their work
Copyright
gives the creators exclusive rights to duplicate, publish, and sell their own materials;
Derivative Work
a piece of work that is created based on one or more pre-existing works
Fair Use Doctrine
allows work to be reproduced for news reporting, teaching, parody, and research
Single-User License Agreement
allows you install the software on your computer and make one backup copy
Digital Security Risk
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Malware
Classification for computer viruses, worms, Trojans, and rootkits
Worm
a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan
a program that hides in a computer and allows someone from a remote location to take full control of the computer
Adware
an online advertisement in a banner or pop-up window on webpages, email, or other Internet service
Spyware
A program placed on your smartphone without your knowledge and it is collecting personal information about you
Phishing
using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
Spoofing
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Cybercrime
online or Internet-based illegal acts
Payload
the destructive event or prank the virus is intended to deliver
Firewall
hardware and/or software that protects a network's resources from intrusion
Cyberbullying
the harassment of computer users through various forms of Internet communications
Keygen
a program used by software companies to generate license keys for users to legally register the software programs they have purchased
Steps to take for Virus Protection
a utility that detects and protects a computer from unauthorized intrusions
Software piracy (theft)
the unauthorized and illegal duplication of copyrighted software
Cookie
a small text file that a web server stores on your computer
Encryption
converting readable text into unreadable code so your personal information is protected
Decryption
Deciphering encrypted data into a readable form