29 terms

Unit 2 - 7th period


Terms in this set (...)

QR Code
a square-shaped coded graphic that corresponds to a web address or other information
special software installed with your with your browser needed in order to listen to an audio file or view a video (ex: Flash Player)
business transactions that occur over the Internet
Home Page
first page of a website; like a cover of a book
process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting (watching a concert online)
Information Privacy
the right of individuals and companies to deny or restrict the collection and use of information about them
Intellectual Property
unique and original works such as ideas, inventions, company logos, and more; the rights to which creators are entitled for their work
gives the creators exclusive rights to duplicate, publish, and sell their own materials;
Derivative Work
a piece of work that is created based on one or more pre-existing works
Fair Use Doctrine
allows work to be reproduced for news reporting, teaching, parody, and research
Single-User License Agreement
allows you install the software on your computer and make one backup copy
Digital Security Risk
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Classification for computer viruses, worms, Trojans, and rootkits
a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
a program that hides in a computer and allows someone from a remote location to take full control of the computer
an online advertisement in a banner or pop-up window on webpages, email, or other Internet service
A program placed on your smartphone without your knowledge and it is collecting personal information about you
using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
online or Internet-based illegal acts
the destructive event or prank the virus is intended to deliver
hardware and/or software that protects a network's resources from intrusion
the harassment of computer users through various forms of Internet communications
a program used by software companies to generate license keys for users to legally register the software programs they have purchased
Steps to take for Virus Protection
a utility that detects and protects a computer from unauthorized intrusions
Software piracy (theft)
the unauthorized and illegal duplication of copyrighted software
a small text file that a web server stores on your computer
converting readable text into unreadable code so your personal information is protected
Deciphering encrypted data into a readable form