Lesson 26: Communication s and Collaborations Flashcards
Biometrics
A technique or device that examines a fingerprint, voice pattern, the iris or retina of the eye.
Filtering
a process that can be used to cut down on or eliminate most junk mail.
Fraud
Something that is intended to deceive; deliberate trickery intended to gain an advantage.
Hoax
an attempt to deceive an audience into believing that something false is real
Logic Bomb
Computer virus triggered by the appearance or disappearance of specified data
Netiquette
a combination of he words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
Phishing
types of personal information scams
Pyramid Schemes
an illicit business model where profits are based on the investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.
RDF Summary
a format originally developed to facilitate the syndication of news articles
Spam
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail
Teleconferencing
Telecommunications service in which parties in remote locations can participate vie telephone in a group meeting.
Time Bomb
computer virus that does not cause its damage until a curtain date or until the system has been booted a certain number of times.
Trojan Horse
Computer virus that does something different from what it is expected to do.
Urban Legend
a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
Virus
A computer program that is written to cause corruption of data