Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Safety Online

Ethics Unit 1

TermDefinition
Anonymous Someone who can’t be identified based on the information at hand
Anti-Spyware software Software designed to stop people from hacking your computer
Anti-Virus software Stops viruses from getting on your computer.
Cookies They are small computer files placed in your computer by the sites you visit. that collect information about your computer system and the webpages you view
Firewall software Software designed to prevent unauthorized access from a private network.
Identity Theft When a thief steals someone’s private information in order to pretend to be that person
Hacker A computer user who attempts to gain unauthorized access other people's computer systems in order to destroy, disrupt or carry out something illegal.
Inappropriate Not proper; not allowed
Internet Browser A software application that runs on your computer and allows you to view Web pages
Malware Programing code designed to harm a computer or its data: malicious code.
Online Predator An adult who stalks kids or teens on the Internet, and tries to draw them into inappropriate talk or actions
Password Protection The requirement that visitors use a password when they access a website so that only certain people can view the site and participate in its online activities
Personal Information Information that can’t be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, etc.
Pharming The practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of taking confidential data from the user.
Phishing Scam to try an obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, but contains a link to a fake Web site that replicates the real one.
Privacy Options Choices a website might give you about what it does with your information
Private Information Information that can be used to identify you, such as your Social Security number, postal address, email address, phone number, etc.
Random Having no pattern
Register (online) To enter your information in order to sign up and get access to a website
Risky Behaviors Possibly dangerous actions such as making your private information available to others online
Screen Name The online name you choose to log in with or to post on a website
Security (online) Freedom from danger. Online, “security” refers to protecting one’s private information and protecting a computer from viruses or “malware”
Security Holes Any flaw in the way a computer program id written or used that makes our computer vulnerable to attack. Security experts also call this a security vulnerability.
Security Patch A fix to a program to close a known security hole. Patches are routinely issued for operating systems and internet browsers as well as other software applications.
Smishing A criminal activity using social engineering techniques similar to phishing used for text messages on a cell phone.
SPAM Electronic junk mail that is generally e-mail advertising for some product. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.
Third Party A person or company other than you and the owner of the website you visit
Trojan Horse A non-replicating computer program planted illegally in another program to do damage locally when the software is activated.
Virus A piece of program code that, like a biological virus, makes copies of itself by attaching itself to another program. The virus can destroy or change files or do nothing and just be annoying. They are usually spread by a computer network, by e-mail
Warning Signs Signs that warn of online dangers; or anything that warns you of danger ahead
Worm A computer program that makes lots of copies of itself, like a computer virus. The main difference between the two is that a computer virus attaches itself to another computer program, but a worm works by itself and can be made to do all sorts of damage
Created by: lmaddox
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards