Cyber Foundations Unit 1 Vocabulary

Ace your homework & exams now with Quizwiz!

uniform resource locator (URL)

the address for a specific webpage or file on the internet

software piracy

the illegal copying, distribution, or use of computer software

online personalities

the social identities that an internet user establishes in online communities and websites

spam

unwanted or inappropriate messages sent via email

internet safety

the act of staying safe online

adware

software that automatically displays or downloads advertising material online, usually unwanted

discussion board

a general term for any online "bulletin board" where you can leave messages and expect to see responses to messages you have left

hacking

a kind of cybercrime in which a criminal uses a computer system to gain access to data on another computing system in order to steal information or corrupt the system

phishing

a kind of cybercrime in which the criminal sends fake emails or messages in an attempt to get people to enter their personal information

learning management system

a software tool that allows you to create, deliver, and report on training courses and programs

spoofing

a type of cybercrime scam in which criminals attempt to obtain people's personal information by pretending to be a legitimate business, friend, or some other innocent party

trojan horse

a type of malware that disguises itself as something else in order to trick you so that cyber-thieves and hackers can gain access to your system

worm

a type of malware that gets into a computer and affects the functions of software and hardware programs, and it copies itself and moves to other computer systems

internet

a vast computer network linking smaller computer networks worldwide

social network

a website or application that enables users to communicate with each other by posting information, comments, messages, images, etc.

wiki

a website that allows users to add or change content on the site (Wikipedia is a famous one)

World Wide Web

all the web pages, pictures, videos and other online content that can be accessed with a web browser

cyberbullying

bullying that takes place over electronic devices such as computers and cell phones

encryption

converting data into code in order to protect private information

cybercrime

crime that uses a computer network

computer ethics

decisions regarding professional and social conduct while using technology

blog

discussion or informational website or web page that is written in diary style

copyright

legal right given to the person/people who originally created a product

computer virus

malware program that can change the way a computer operates and can spread to other computers through attachments, files, etc.

spyware

malware program that secretly monitors what computer uses do in order to capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information

ethics

moral principles that guide our behavior

software

program that tells a computer what to do

firewall

program used to help protect a computer system from malware & cybercrime attacks by blocking unauthorized access to the system

e-mail (electronic mail)

sending messages via a computer network

browser

software program such as Google Chrome and Internet Explorer that is used to access the World Wide Web

malware

software programs designed to damage or do other unwanted actions on a computer system


Related study sets

SOC101 - Module 7 - Week 1 - Population, Urbanization, and the Environment

View Set

Chapter 10 - Cash and Financial Investments

View Set

Chapter 22: The Digestive System

View Set

Macroeconomics midterm 2 (chapters 9, 10 , 12, 13, 15 ,16)

View Set

Oceanography test #1 review ch 1, 2, and 3

View Set

Econ Ch 6-9 Homework prep for exam

View Set