Ethics Unit 1
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Anonymous | Someone who can’t be identified based on the information at hand
🗑
|
||||
Anti-Spyware software | Software designed to stop people from hacking your computer
🗑
|
||||
Anti-Virus software | Stops viruses from getting on your computer.
🗑
|
||||
Cookies | They are small computer files placed in your computer by the sites you visit. that collect information about your computer system and the webpages you view
🗑
|
||||
Firewall software | Software designed to prevent unauthorized access from a private network.
🗑
|
||||
Identity Theft | When a thief steals someone’s private information in order to pretend to be that person
🗑
|
||||
Hacker | A computer user who attempts to gain unauthorized access other people's computer systems in order to destroy, disrupt or carry out something illegal.
🗑
|
||||
Inappropriate | Not proper; not allowed
🗑
|
||||
Internet Browser | A software application that runs on your computer and allows you to view Web pages
🗑
|
||||
Malware | Programing code designed to harm a computer or its data: malicious code.
🗑
|
||||
Online Predator | An adult who stalks kids or teens on the Internet, and tries to draw them into inappropriate talk or actions
🗑
|
||||
Password Protection | The requirement that visitors use a password when they access a website so that only certain people can view the site and participate in its online activities
🗑
|
||||
Personal Information | Information that can’t be used to identify you, such as your age, gender, how many
brothers and sisters you have, your favorite food, etc.
🗑
|
||||
Pharming | The practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of taking confidential data from the user.
🗑
|
||||
Phishing | Scam to try an obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, but contains a link to a fake Web site that replicates the real one.
🗑
|
||||
Privacy Options | Choices a website might give you about what it does with your information
🗑
|
||||
Private Information | Information that can be used to identify you, such as your Social Security number, postal address, email address, phone number, etc.
🗑
|
||||
Random | Having no pattern
🗑
|
||||
Register (online) | To enter your information in order to sign up and get access to a website
🗑
|
||||
Risky Behaviors | Possibly dangerous actions such as making your private information available to others online
🗑
|
||||
Screen Name | The online name you choose to log in with or to post on a website
🗑
|
||||
Security (online) | Freedom from danger. Online, “security” refers to protecting one’s private information and protecting a computer from viruses or “malware”
🗑
|
||||
Security Holes | Any flaw in the way a computer program id written or used that makes our computer vulnerable to attack. Security experts also call this a security vulnerability.
🗑
|
||||
Security Patch | A fix to a program to close a known security hole. Patches are routinely issued for operating systems and internet browsers as well as other software applications.
🗑
|
||||
Smishing | A criminal activity using social engineering techniques similar to phishing used for text messages on a cell phone.
🗑
|
||||
SPAM | Electronic junk mail that is generally e-mail advertising for some product. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.
🗑
|
||||
Third Party | A person or company other than you and the owner of the website you visit
🗑
|
||||
Trojan Horse | A non-replicating computer program planted illegally in another program to do damage locally when the software is activated.
🗑
|
||||
Virus | A piece of program code that, like a biological virus, makes copies of itself by attaching itself to another program. The virus can destroy or change files or do nothing and just be annoying. They are usually spread by a computer network, by e-mail
🗑
|
||||
Warning Signs | Signs that warn of online dangers; or anything that warns you of danger ahead
🗑
|
||||
Worm | A computer program that makes lots of copies of itself, like a computer virus. The main difference between the two is that a computer virus attaches itself to another computer program, but a worm works by itself and can be made to do all sorts of damage
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
lmaddox
Popular Computers sets