Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ethics Unit 1

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Anonymous   Someone who can’t be identified based on the information at hand  
🗑
Anti-Spyware software   Software designed to stop people from hacking your computer  
🗑
Anti-Virus software   Stops viruses from getting on your computer.  
🗑
Cookies   They are small computer files placed in your computer by the sites you visit. that collect information about your computer system and the webpages you view  
🗑
Firewall software   Software designed to prevent unauthorized access from a private network.  
🗑
Identity Theft   When a thief steals someone’s private information in order to pretend to be that person  
🗑
Hacker   A computer user who attempts to gain unauthorized access other people's computer systems in order to destroy, disrupt or carry out something illegal.  
🗑
Inappropriate   Not proper; not allowed  
🗑
Internet Browser   A software application that runs on your computer and allows you to view Web pages  
🗑
Malware   Programing code designed to harm a computer or its data: malicious code.  
🗑
Online Predator   An adult who stalks kids or teens on the Internet, and tries to draw them into inappropriate talk or actions  
🗑
Password Protection   The requirement that visitors use a password when they access a website so that only certain people can view the site and participate in its online activities  
🗑
Personal Information   Information that can’t be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, etc.  
🗑
Pharming   The practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of taking confidential data from the user.  
🗑
Phishing   Scam to try an obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, but contains a link to a fake Web site that replicates the real one.  
🗑
Privacy Options   Choices a website might give you about what it does with your information  
🗑
Private Information   Information that can be used to identify you, such as your Social Security number, postal address, email address, phone number, etc.  
🗑
Random   Having no pattern  
🗑
Register (online)   To enter your information in order to sign up and get access to a website  
🗑
Risky Behaviors   Possibly dangerous actions such as making your private information available to others online  
🗑
Screen Name   The online name you choose to log in with or to post on a website  
🗑
Security (online)   Freedom from danger. Online, “security” refers to protecting one’s private information and protecting a computer from viruses or “malware”  
🗑
Security Holes   Any flaw in the way a computer program id written or used that makes our computer vulnerable to attack. Security experts also call this a security vulnerability.  
🗑
Security Patch   A fix to a program to close a known security hole. Patches are routinely issued for operating systems and internet browsers as well as other software applications.  
🗑
Smishing   A criminal activity using social engineering techniques similar to phishing used for text messages on a cell phone.  
🗑
SPAM   Electronic junk mail that is generally e-mail advertising for some product. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.  
🗑
Third Party   A person or company other than you and the owner of the website you visit  
🗑
Trojan Horse   A non-replicating computer program planted illegally in another program to do damage locally when the software is activated.  
🗑
Virus   A piece of program code that, like a biological virus, makes copies of itself by attaching itself to another program. The virus can destroy or change files or do nothing and just be annoying. They are usually spread by a computer network, by e-mail  
🗑
Warning Signs   Signs that warn of online dangers; or anything that warns you of danger ahead  
🗑
Worm   A computer program that makes lots of copies of itself, like a computer virus. The main difference between the two is that a computer virus attaches itself to another computer program, but a worm works by itself and can be made to do all sorts of damage  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: lmaddox
Popular Computers sets