Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/10

Click to flip

10 Cards in this Set

  • Front
  • Back

What are the three primary privacy issues?

Accuracy, Property, and Access.

To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):

Reverse directory.

Browsers store the locations of sites visited in a:

History File.

The browser mode that eliminates history files and blocks most cookies.

Privacy.

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:

Online Identity.

Computer criminals who create and distribute malicious programs are known as:

Crackers.

Programs that come into a computer system disguised as something else are called:

Trojan Horses.

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

Cyber-bullying.

Special hardware and software used to control access to a corporation’s private network is known as a(n):

Firewall.

To prevent copyright violations, corporations often use:

DRM.