ICT Ethics Terms Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
Plagiarism | stealing and passing off (the ideas or words of another) as one's own |
Hacker | a person who illegally gains access to and sometimes tampers with information in a computer system |
Firewall | computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet) |
Phishing | a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly |
Copyright | the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work) |
Piracy | the unauthorized use of another's production, invention, or conception especially in infringement of a copyright |
Spoofing | a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. |
Cybercrime | any criminal act dealing with computers and networks (called hacking). It also includes crimes conducted through the internet. |
Encryption | the translation of data into a secret code. It is the most effective way to achieve data security |
Computer forensics | the application of scientifically proven methods to gather, process, interpret, and use digital evidence to provide a description of cyber crime activities. |
Spyware | a form of software that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user’s browsing patterns. |
Virus | a computer program that is usually hidden within another seemingly harmless program and that produces copies of itself and inserts them into other programs and usually performs a malicious action (as destroying data) |
Worm | a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action |
Spam | unsolicited usually commercial e-mail sent to a large number of addresses |
Public domain | is a range of abstract materials – commonly referred to as intellectual property – which are not owned or controlled by anyone. The term indicates that these materials are therefore "public property", and available for anyone to use for any purpose. |
Created by:
CoachLeach
Popular Computers sets