Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Safety Online

Ethics Unit 1

TermDefinition
Anonymous Someone who can’t be identified based on the information at hand
Anti-Spyware software Software designed to stop people from hacking your computer
Anti-Virus software Stops viruses from getting on your computer.
Cookies They are small computer files placed in your computer by the sites you visit. that collect information about your computer system and the webpages you view
Firewall software Software designed to prevent unauthorized access from a private network.
Identity Theft When a thief steals someone’s private information in order to pretend to be that person
Hacker A computer user who attempts to gain unauthorized access other people's computer systems in order to destroy, disrupt or carry out something illegal.
Inappropriate Not proper; not allowed
Internet Browser A software application that runs on your computer and allows you to view Web pages
Malware Programing code designed to harm a computer or its data: malicious code.
Online Predator An adult who stalks kids or teens on the Internet, and tries to draw them into inappropriate talk or actions
Password Protection The requirement that visitors use a password when they access a website so that only certain people can view the site and participate in its online activities
Personal Information Information that can’t be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, etc.
Pharming The practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of taking confidential data from the user.
Phishing Scam to try an obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, but contains a link to a fake Web site that replicates the real one.
Privacy Options Choices a website might give you about what it does with your information
Private Information Information that can be used to identify you, such as your Social Security number, postal address, email address, phone number, etc.
Random Having no pattern
Register (online) To enter your information in order to sign up and get access to a website
Risky Behaviors Possibly dangerous actions such as making your private information available to others online
Screen Name The online name you choose to log in with or to post on a website
Security (online) Freedom from danger. Online, “security” refers to protecting one’s private information and protecting a computer from viruses or “malware”
Security Holes Any flaw in the way a computer program id written or used that makes our computer vulnerable to attack. Security experts also call this a security vulnerability.
Security Patch A fix to a program to close a known security hole. Patches are routinely issued for operating systems and internet browsers as well as other software applications.
Smishing A criminal activity using social engineering techniques similar to phishing used for text messages on a cell phone.
SPAM Electronic junk mail that is generally e-mail advertising for some product. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.
Third Party A person or company other than you and the owner of the website you visit
Trojan Horse A non-replicating computer program planted illegally in another program to do damage locally when the software is activated.
Virus A piece of program code that, like a biological virus, makes copies of itself by attaching itself to another program. The virus can destroy or change files or do nothing and just be annoying. They are usually spread by a computer network, by e-mail
Warning Signs Signs that warn of online dangers; or anything that warns you of danger ahead
Worm A computer program that makes lots of copies of itself, like a computer virus. The main difference between the two is that a computer virus attaches itself to another computer program, but a worm works by itself and can be made to do all sorts of damage
Created by: lmaddox