Computer Tech
What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really works. Click here and read the article completely! It is full of great information.here
A security system consisting of hardware and/or software that prevents unauthorized intrusion Phishing Spam Firewall Denial of Service
Hides within or looks like legitimate program until triggered Worm Trojan Horse Virus Spam To learn more about how a Trojan Horse works, read the article and then scroll down to watch the video from “How Stuff Works” (brought to you by the “Lab Rats”. Click here.here
An illegal duplication of copyrighted software Software Encryption Ergonomics Software Phishing Software Software Piracy
When you buy a computer software program, what does the software license agreement let you do? Right to use software – (you don’t own the software, you only have a license to use it.) Right to sell software – after you buy the software you can sell it to as many people as you want. Right to change the software – (after you buy it, you can edit it any way you want.)
A scam in which a perpetrator sends an official looking that attempts to obtain your personal and financial information Phishing Scamming Spying Adwaring Learn more about Phishing by watching the video from “How Stuff Works.watching the video
What are moral guidelines that govern the use of computers and information systems Computer Ergonomics Computer Ethics Computer Intellectual Rights Computer Privacy Guidelines
An applied science devoted to comfort, efficiency, and safety in the work place Relaxation Encrypting Ergonomics Slacking
A potentially damaging computer program Virus Worm Trojan Horse Spam To learn more about how computer viruses work, read the article from “How Stuff Works”. It’s a great article!article
This software program identifies and removes viruses Firewall Software Anti Piracy Software Ergonomics Software Anti Virus Software
What is a small file that is put on your computer that contains data about you? Cookie Trojan Horse Worm Virus To understand better how cookies work, read this article from “How Stuff Works”.this article
Watch this video on Internet cookies!
What copies itself repeatedly, using up computer resources and can possibly shut your computer & network down? Virus Trojan Horse Worm Cookie
The process of converting plaintext (readable data)into ciphertext (unreadable characters) Scrambling Phishing Spamming Encryption
What is it called when a computer consumes your entire social life? Computer addiction Computer ethics Computer ergonomics Computer spamming
Reducing electricity and environmental waste while using computers Salvaging Reprocessing Reclaiming Green computing