Lesson 26: Communication s and Collaborations Flashcards

1
Q

Biometrics

A

A technique or device that examines a fingerprint, voice pattern, the iris or retina of the eye.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filtering

A

a process that can be used to cut down on or eliminate most junk mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fraud

A

Something that is intended to deceive; deliberate trickery intended to gain an advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hoax

A

an attempt to deceive an audience into believing that something false is real

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bomb

A

Computer virus triggered by the appearance or disappearance of specified data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Netiquette

A

a combination of he words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

types of personal information scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pyramid Schemes

A

an illicit business model where profits are based on the investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RDF Summary

A

a format originally developed to facilitate the syndication of news articles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spam

A

unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Teleconferencing

A

Telecommunications service in which parties in remote locations can participate vie telephone in a group meeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Time Bomb

A

computer virus that does not cause its damage until a curtain date or until the system has been booted a certain number of times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan Horse

A

Computer virus that does something different from what it is expected to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Urban Legend

A

a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus

A

A computer program that is written to cause corruption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Worm

A

computer virus that makes many copies of itself resulting in the consumption of system resources that slows down or actually halts tasks