How can we help?

You can also find more resources in our Help Center.

Study sets matching "term:phishing = a scam in which a perpetrator sends an official e mail message that attempts to obtain your personal and financial information"

Study sets
Classes
Users

Study sets matching "term:phishing = a scam in which a perpetrator sends an official e mail message that attempts to obtain your personal and financial information"

20 terms
kitchen safety and sanitation (electrical appliances)
the act of defacing or destroying comp…
an unsolicited e mail message sent to…
hides within or looks like legitimate…
the right of individuals and companies…
Hardware Vandalism
spam
Trojan horse
information privicay
the act of defacing or destroying comp…
Hardware Vandalism
an unsolicited e mail message sent to…
spam
12 terms
LG 1.11 Computer Ethics and Security
CopyRight
BackDoor
Phishing
Quarantine
Gives authors and artists exclusive rights to their materials
Program that allow users to bypass security controls when acc…
Scam in which a perpetrator sends an official looking email m…
Separate area of a hard disk that holds the infected file unt…
CopyRight
Gives authors and artists exclusive rights to their materials
BackDoor
Program that allow users to bypass security controls when acc…
16 terms
cs ch.4
program/software
application/app
operating system
database
tells computer what tasks to perform and how to preform them
programs designed to make users more productive/assist
set of programs that coordinates all the activities among com…
collection of data organized in a manner that allows access,…
program/software
tells computer what tasks to perform and how to preform them
application/app
programs designed to make users more productive/assist
13 terms
Personal Computing - Chapter 4
Phishing
Word Processing
Query
Personal Firewall
A scam in which a perpetrator sends an official looking e-mai…
Software that allows users to create and manipulate documents…
a request for specific data from a database
a utility that detects and protects a computer from unauthori…
Phishing
A scam in which a perpetrator sends an official looking e-mai…
Word Processing
Software that allows users to create and manipulate documents…
16 terms
Emptech Lesson 2 pt. 2
backup
Computer ethics
Intellectual property rights
IT code of conduct
is a duplicate of a file, program, or disk that can be used i…
are the moral guidelines that govern the use of computers and…
are the rights to which creators are entitled for their work
is a written guideline that helps determine whether a specifi…
backup
is a duplicate of a file, program, or disk that can be used i…
Computer ethics
are the moral guidelines that govern the use of computers and…
16 terms
IPT - DISCOVERY COMPUTERS CHAPTER 4
Shareware
Freeware
Open source software
Public-domain software
A copyrighted software that is distributed at no cost for a t…
A copyrighted software that is distributed at no cost by an i…
Has no restriction from the copyright holder, software provid…
Donated for public use and has no copyright restrictions.
Shareware
A copyrighted software that is distributed at no cost for a t…
Freeware
A copyrighted software that is distributed at no cost by an i…
17 terms
Ethics
Hacker
Cracker
Computer Security Risk
Cybercrime
This is someone that seeks to understand computer strictly fo…
This is the common term used to describe a malicious hacker
is any event or action that could cause a loss of or damage t…
is an online or Internet-based illegal act
Hacker
This is someone that seeks to understand computer strictly fo…
Cracker
This is the common term used to describe a malicious hacker
22 terms
computer security
trojan house
rootkit
dos attack
payload
a malicious program that hides within or looks like a legitim…
a program that hides in a computer and allows someone from a…
disrupts computer access to internet services sometimes using…
destructive event or prank that a program is intended to deli…
trojan house
a malicious program that hides within or looks like a legitim…
rootkit
a program that hides in a computer and allows someone from a…
BIM Chapter 4
Opensource Software
Shareware
Public-domain Software
Format
software provided for use, modification, and redistribution
copyrighted software that is distributed at no cost for a tri…
Donated for public use without copyrights
Appearance changes
Opensource Software
software provided for use, modification, and redistribution
Shareware
copyrighted software that is distributed at no cost for a tri…
21 terms
CIS 10.3
RSI: (Repetitive strain injury)
CVS: (Computer vision syndrome)
Ergonomics
Computer Addiction
an injury or disorder of the muscles, nerves, tendons, ligame…
Health-related condition due to computer usage that results i…
An applied science devoted to incorporating comfort, efficien…
Occurs when the computer consumes someone's entire social life
RSI: (Repetitive strain injury)
an injury or disorder of the muscles, nerves, tendons, ligame…
CVS: (Computer vision syndrome)
Health-related condition due to computer usage that results i…
9 terms
CGS2060 Ch.5
Digital security risk
Computer crime
Botnet
DoS attack
any event or action that could cause a loss of or damage to a…
any illegal act involving the use of a computer or related de…
A group of compromised computers or mobile devices connected…
Denial of service attack disrupts computer access to Internet…
Digital security risk
any event or action that could cause a loss of or damage to a…
Computer crime
any illegal act involving the use of a computer or related de…
12 terms
IT - Chapter 5 - Digital Safety and Security (cont.)
Cyberterrorist
Cyberextortionist
Script kiddie
Hacker
is someone who uses the Internet or network to destroy or dam…
is someone who demands payment to stop an attack on an organi…
has he same intent as a cracker but does not have the technic…
refers to someone who accesses a computer or network illegall…
Cyberterrorist
is someone who uses the Internet or network to destroy or dam…
Cyberextortionist
is someone who demands payment to stop an attack on an organi…
14 terms
Test 2 computer science
Program/software
Operating system
Licensing agreement
Software suite
Tells the computer what task to perform and how to perform them
Is a set of programs that coordinates all the activities amon…
The right to use a program
Is a collection of individual programs available together as…
Program/software
Tells the computer what task to perform and how to perform them
Operating system
Is a set of programs that coordinates all the activities amon…
CIS 111 Computer Information Systems - Chapter 4 Study Guide
Anti-spam program
Computer aided design
Disk defragmenter
Folder
A filtering programs that attempts to remove spam before it r…
A type of application that assists professionals and designer…
A tool that reorganizes the files and unused space on a compu…
a specific named location on a storage medium that contains r…
Anti-spam program
A filtering programs that attempts to remove spam before it r…
Computer aided design
A type of application that assists professionals and designer…
30 terms
Chapter 4 Programs and Apps: Using Software at Work, School and Home
Desktop operating systems
Clipart
Presentation Software
Spreadsheet software
_________________________________ include Mac OS, Windows, an…
_________________________________ is a collection of drawings…
_________________________________ is an application that allo…
_________________________________ is an application that allo…
Desktop operating systems
_________________________________ include Mac OS, Windows, an…
Clipart
_________________________________ is a collection of drawings…
15 terms
ryuichi scams
scams
spams
junk e-mails
phishing scams
tricks to get your money or personal information
Unwanted and unsolicited e-mails
E-mails that are not welcome or solicited, they are often sen…
where people receive fraud emails that ask them to supply acc…
scams
tricks to get your money or personal information
spams
Unwanted and unsolicited e-mails
62 terms
Year 11 Computer Science Exam Revision
ALU
CPU
1NF
RFiD
Arithmetic Logic Unit
Central Processing Unit
Each item in columns/field should only contain one value only…
A tag that allows one to identify a product, person, key, or…
ALU
Arithmetic Logic Unit
CPU
Central Processing Unit
15 terms
Computer Security, Ethics, and Privacy
CopyRight
Backdoor
Phishing
Cookie
Gives authors and artists exclusive rights to their materials
Program that allow users to bypass the security controls when…
Scam in which a perpetrator sends an official looking email m…
Small text file that a Web server stores on a computer
CopyRight
Gives authors and artists exclusive rights to their materials
Backdoor
Program that allow users to bypass the security controls when…
15 terms
unit 2 ethics
computer security risk
cybercrime
Computer Virus
Worm
any event or action that could cause a loss of or damage to c…
is an online or Internet-based illegal act
Affects a computer negatively by altering the way the compute…
Copies itself repeatedly
computer security risk
any event or action that could cause a loss of or damage to c…
cybercrime
is an online or Internet-based illegal act
21 terms
CIS Ch. 10.3
RSI
CVS
Ergonomics
Computer Addiction
(Repetitive Strain Energy) An injury or disorder of the muscl…
(Computer Vision Syndrome) Eye strain as a result of looking…
An applied science devoted to incorporating comfort, efficien…
Occurs when the computer consumes someone's entire social life
RSI
(Repetitive Strain Energy) An injury or disorder of the muscl…
CVS
(Computer Vision Syndrome) Eye strain as a result of looking…
20 terms
11 vocabulary technology
surge protector
zombie
quarintine
cracker
Device that uses special electrical components to smooth out…
A compromised computer whose owner is unaware the computer is…
Separate area of a hard disk that holds the infected file unt…
also is someone who accesses a computer or network illegally…
surge protector
Device that uses special electrical components to smooth out…
zombie
A compromised computer whose owner is unaware the computer is…
15 terms
Safety, Privacy, Ethics
backup
botnet
virus
DoS
a duplicate of a file, program, or media that can be used if…
a group of compromised computers or mobile devices connected…
A computer program that can copy itself and cause harm in var…
disrupts computer access to Internet services
backup
a duplicate of a file, program, or media that can be used if…
botnet
a group of compromised computers or mobile devices connected…
40 terms
Computer and Information Sciences 10
RSI: (Repetitive strain injury)
CVS: (Computer vision syndrome)
Ergonomics
Computer Addiction
an injury or disorder of the muscles, nerves, tendons, ligame…
Health-related condition due to computer usage that results i…
An applied science devoted to incorporating comfort, efficien…
Occurs when the computer consumes someone's entire social life
RSI: (Repetitive strain injury)
an injury or disorder of the muscles, nerves, tendons, ligame…
CVS: (Computer vision syndrome)
Health-related condition due to computer usage that results i…
24 terms
CS 130 Chapter 5 Review
Digital security risk
Computer crime
Cybercrime
Malware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a comptuer or related de…
online or Internet-based illegal acts such as distributing ma…
programs that act without a user's knowledge and deliberately…
Digital security risk
any event or action that could cause a loss of or damage to c…
Computer crime
any illegal act involving the use of a comptuer or related de…
37 terms
MIS Security
Trojan Horse
Worm
Virus
Payload
Malicious program that hides within or looks like a legitimat…
Destructive program that which copies itself repeatedly using…
Computer code that copies itself into computer applications,…
Destructive event or prank the program is intended to deliver
Trojan Horse
Malicious program that hides within or looks like a legitimat…
Worm
Destructive program that which copies itself repeatedly using…
17 terms
CIS Chapter 4
Anti-spam program
Computer aided design
Disk defragmenter
Folder
A filtering program that attempts to remove spam before it re…
A type of application that assists professionals and designer…
A tool that reorganizes the files and unused space on a compu…
A specific named location on a storage medium that contains r…
Anti-spam program
A filtering program that attempts to remove spam before it re…
Computer aided design
A type of application that assists professionals and designer…
12 terms
Chapter Five
cybercrime
virus
worm
malware
online or internet based illegal acts such as distributing ma…
a potentially damaging computer program that infects or effec…
malware that resides in active memory and replicates itself o…
programs that act without the users knowledge and alter opera…
cybercrime
online or internet based illegal acts such as distributing ma…
virus
a potentially damaging computer program that infects or effec…
13 terms
CIS 150 - Chapter 4 Vocab
adware remover
database
file compression tool
file manager
a program that detects and deletes adware
a collection of data organized in a manner that allows access…
took that shrinks the size of a file
a tool that performs functions related to displaying files in…
adware remover
a program that detects and deletes adware
database
a collection of data organized in a manner that allows access…
49 terms
Digital Security Risks Part I
hacker
cracker
script kiddie
adware
Someone who accesses a computer or network illegally.
Someone who accesses a computer or network illegally with the…
Cybercriminal who has the same intent as a cracker but does n…
A program that displays an online advertisement in a banner o…
hacker
Someone who accesses a computer or network illegally.
cracker
Someone who accesses a computer or network illegally with the…
11 terms
Career Prep Mid-Term Part 8: Multiple Choice
________ occurs when individuals attem…
_________ authenticates network users…
________ is an applied science devoted…
The ________ program was developed by…
war driving
Wi-Fi Protected Access (WPA)
Ergonomics
Energy Star
________ occurs when individuals attem…
war driving
_________ authenticates network users…
Wi-Fi Protected Access (WPA)
29 terms
Ch 5 COSC 111
digital security risk
computer crime
cybercrime
Malware
any event or action that could cause a loss of or damage to a…
Any illegal act involving the use of a computer or related de…
online or Internet-based illegal act
consists of programs that act without a user's knowledge and…
digital security risk
any event or action that could cause a loss of or damage to a…
computer crime
Any illegal act involving the use of a computer or related de…
CIS 111 - Chapter 4 Study Guide
Anti-spam program
Computer aided design
Disk defragmenter
Folder
A filtering program that attempts to remove spam before it re…
Software that is a type of application that assists professio…
A tool that reorganizes the files and unused space on a compu…
A specific named location on a storage medium that contains r…
Anti-spam program
A filtering program that attempts to remove spam before it re…
Computer aided design
Software that is a type of application that assists professio…
20 terms
Computer Safety
Antivirus
Blog
Chat Rooms
Cookie
a program that detects viruses and repairs files
A web log is a person's personal opinion about topics
established so that people can discuss common interests
a small file that is downloaded by some websites to store you…
Antivirus
a program that detects viruses and repairs files
Blog
A web log is a person's personal opinion about topics
27 terms
Chapter 4 Primary
Accounting software
Adware remover
anti spy program
backup tool
An application that helps businesses of all sizes record and…
A program that detects and deletes adware.
A filtering program that attempts to remove spam before it re…
A program that allows users to copy, or back up, selected fil…
Accounting software
An application that helps businesses of all sizes record and…
Adware remover
A program that detects and deletes adware.
Computer Security
Payload
Virus
Worm
Trojan horse
destructive event or prank the program is intended to deliver
computer code that copies itself into computer applications,d…
Type of virus that replicates itself at a rapid rate to cause…
destructive program that hides within or appears to be a legi…
Payload
destructive event or prank the program is intended to deliver
Virus
computer code that copies itself into computer applications,d…
41 terms
MIS 1305 Test #2 (Lapes)
Payload
Worm
Trojan Horse
Rootkit
Destructive event or prank the program is intended to deliver
Copies itself repeatedly, using up resources and possibly shu…
A malicious program that hides within or looks like a legitim…
Program that hides in a computer and allows someone from a re…
Payload
Destructive event or prank the program is intended to deliver
Worm
Copies itself repeatedly, using up resources and possibly shu…
Computer Ethics (MAIN)
Computer Crime
Cybercrime
Hacker
Cyber extortionist
Any illegal act involving a computer generally
online or Internet-based illegal acts.
although originally a complimentary word for a computer enthu…
someone who uses e-mail as a vehicle for extortion.
Computer Crime
Any illegal act involving a computer generally
Cybercrime
online or Internet-based illegal acts.
20 terms
Computer Ethics and Security
computer crime
cyber crime
hacker
cyber extortionist
any illegal act involving a computer generally
refers to online or internet-based illegal acts
refers to someone who accesses a computer or network illegally.
someone who uses e-mail as a vehicle for extortion
computer crime
any illegal act involving a computer generally
cyber crime
refers to online or internet-based illegal acts
14 terms
Comp Chp 5
Digital Security Risk
Cyber crime
Malware
Botnet
Any event or action that could cause a loss of damage to a co…
An online or internet based illegal act
Consists of programs that act without a users knowledge and d…
A group of compromised computers connected to a network
Digital Security Risk
Any event or action that could cause a loss of damage to a co…
Cyber crime
An online or internet based illegal act
15 terms
Safety, Privacy, Ethics
backup
botnet
virus
DoS
a duplicate of a file, program, or media that can be used if…
a group of compromised computers or mobile devices connected…
A computer program that can copy itself and cause harm in var…
disrupts computer access to Internet services
backup
a duplicate of a file, program, or media that can be used if…
botnet
a group of compromised computers or mobile devices connected…
37 terms
MIS Security
destructive event or prank the program…
computer code that copies itself into…
a type of virus that replicates itself…
destructive program that hides within…
payload
virus
worm
Trojan horse
destructive event or prank the program…
payload
computer code that copies itself into…
virus
10 terms
Chapter 4 business computers 235
Tools
Shareware
Software-as-a-service
Q R code
Program that enables you to perform maintenance type test usu…
Copyrighted software that is distributed at no cost for a tri…
Computing environment where an internet server host and deplo…
Square-shaped it graphic that represents a web address or oth…
Tools
Program that enables you to perform maintenance type test usu…
Shareware
Copyrighted software that is distributed at no cost for a tri…
20 terms
ch 11
code of conduct
computer addiction
computer ethics
computer forensics
Written guidelines that helps determine whether a specific co…
Growing health problem that occurs when the computer consumes…
Moral guidelines that govern the use of computers and informa…
The discovery, collection, and analysis of evidence found on…
code of conduct
Written guidelines that helps determine whether a specific co…
computer addiction
Growing health problem that occurs when the computer consumes…
20 terms
technology chapter 11 vocabulary
code of conduct
computer addiction
computer ethics
computer forensics
written guidelines that help determine whether a specific com…
growing health problem that occurs when the computer consumes…
moral guidelines that govern the use of computers and informa…
The discovery, collection, and analysis of evidence found on…
code of conduct
written guidelines that help determine whether a specific com…
computer addiction
growing health problem that occurs when the computer consumes…
15 terms
Safety, Privacy, Ethics
backup
botnet
virus
DoS
a duplicate of a file, program, or media that can be used if…
a group of compromised computers or mobile devices connected…
A computer program that can copy itself and cause harm in var…
disrupts computer access to Internet services
backup
a duplicate of a file, program, or media that can be used if…
botnet
a group of compromised computers or mobile devices connected…
20 terms
ch. 11 vocab (tech)
code of conduct
computer addiction
computer ethics
computer forensics
Written guidelines that helps determine whether a specific co…
Growing health problem that occurs when the computer consumes…
Moral guidelines that govern the use of computers and informa…
The discovery, collection, and analysis of evidence found on…
code of conduct
Written guidelines that helps determine whether a specific co…
computer addiction
Growing health problem that occurs when the computer consumes…
18 terms
CIS 1000 - Chapter 4.
tools or utilities
custom
license agreement
spreadsheet
Programs called _____ enable you to perform maintenance-type…
_____ software performs functions specific to a business of i…
A(n) _____ is the right to use a program or app.
_____ software is an application that allows users to organiz…
tools or utilities
Programs called _____ enable you to perform maintenance-type…
custom
_____ software performs functions specific to a business of i…
20 terms
CH. 11 VOCAB
code of conduct
computer addiction
computer ethics
computer forensics
Written guidelines that helps determine whether a specific co…
Growing health problem that occurs when the computer consumes…
Moral guidelines that govern the use of computers and informa…
The discovery, collection, and analysis of evidence found on…
code of conduct
Written guidelines that helps determine whether a specific co…
computer addiction
Growing health problem that occurs when the computer consumes…
18 terms
Chapter 4 Programs and Apps
A program that hides in a computer or…
Software provided for use, modificatio…
Copyrighted software that is distribut…
Square-shaped graphic that corresponds…
rootkit
open source software
shareware
QR code
A program that hides in a computer or…
rootkit
Software provided for use, modificatio…
open source software
18 terms
TECH CHAPTER 11 VOCAB
Code of Conduct
Computer Addiction
Computer Ethnics
Computer Forensics
Written guidelines that helps determine whether a specific co…
Growing health problem that occurs when the computer consumes…
Moral guidelines that govern the use of computers and informa…
The discovery, collection, and analysis of evidence found on…
Code of Conduct
Written guidelines that helps determine whether a specific co…
Computer Addiction
Growing health problem that occurs when the computer consumes…
1 of 8