Lesson 31: Computer Ethics and Safety Flashcards

(36 cards)

1
Q

Used to protect against unwanted access or use to or form a network

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For your personal computer. It should not contain personal information such as a name or birthdate

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Require more information than a password to authenticate your identity

A

Two-Step Verifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to block content coming into and going out to the Internet

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Used to block content coming into and going out to the Internet

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to any software that is designed to cause damage to a single computer, server, or computer network

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program that had been written to corrupt data on a computer; attached to a file and spreads from file to file when program is executed

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Makes many copies of itself, so that computer slows down or halts tasks

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does not cause damage until a specified date or until the system has been launched a certain number of times

A

Time Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Triggered by the appearance or disappearance of specified data

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does something different from what is expected to do; performs one task but is actually doing another task

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious program that records keystrokes; aids identity theft

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fraudulently installed on a personal computer to collect information about the user

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asksa link in the email to update personal info

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asks a link in the email to update personal info

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Before providing personal info in an e-commerce site, first verify if the site is secure

A

E-Commerce Safety

17
Q

E-commerce websites usually use _________ _____________ to make them secure

A

Encrypted Communication

18
Q

Before you make a financial transaction, you need to confirm that you have a secure and encrypted connection

A

E-Commerce Safety

19
Q

TLS

A

Transport Layer Security

20
Q

SSL

A

Secure Sockets Layer

21
Q

Technology encrypt sensitive information and authenticate servers and clients to ensure a secure connection

22
Q

___ and ___ use public key encryption to authenticate the server to the client

23
Q

Encrypts information

24
Q

Deciphers the information

25
An electronic document that verifies the identity of a person or company and confirms that they own a public key
Digital Certificate
26
Use certificate authorities to confirm that the certificate comes from a trusted party
Digital Certificate: TLS and SSL
27
A small text file that a Web site's server puts on your computer to store information about you and your preferences
Cookie
28
The suppression of Web content that is considered offensive or a threat to security
Internet Censorship
29
___ __________ censors the content published on the Web to protect citizens and businesses
The Government
30
An unlawful reproduction and/or distribution of any copyrighted digital files including videos, music, e-books, and software; is stealing
Software Piracy
31
Belongs to the public, so the software licensing has no restrictions
Public Domain Software
32
Allows you to download and use the software at no cost, or for a voluntary fee; usually allows unlimited copying and distribution but for bids any changes to the program
Freeware
33
Initially available for a free trial for a specified period of time; generally requires that users pay a fee for continued use
Shareware
34
The source code is available free of charge to the general public for use and/or modification
Open Source
35
Provide remote access to software applications hosted on the Internet
Software as a Service and Application Service Provider (SaaS) and (ASP)
36
Normally restrict usage and require you to register and login with a username and a password
Software as a Service and Application Service Provider (SaaS) and (ASP)