Download presentation
Presentation is loading. Please wait.
Published byIsrael Tilton Modified over 9 years ago
1
Computer Tech
2
What is an unsolicited e-mail message sent to many recipients Adware Spam Spyware Phishing here here Want to know how email spam really works. Click here and read the article completely! It is full of great information.here
3
A security system consisting of hardware and/or software that prevents unauthorized intrusion Phishing Spam Firewall Denial of Service
4
Hides within or looks like legitimate program until triggered Worm Trojan Horse Virus Spam To learn more about how a Trojan Horse works, read the article and then scroll down to watch the video from “How Stuff Works” (brought to you by the “Lab Rats”. Click here.here
5
An illegal duplication of copyrighted software Software Encryption Ergonomics Software Phishing Software Software Piracy
6
When you buy a computer software program, what does the software license agreement let you do? Right to use software – (you don’t own the software, you only have a license to use it.) Right to sell software – after you buy the software you can sell it to as many people as you want. Right to change the software – (after you buy it, you can edit it any way you want.)
7
A scam in which a perpetrator sends an official looking email that attempts to obtain your personal and financial information Phishing Scamming Spying Adwaring Learn more about Phishing by watching the video from “How Stuff Works.watching the video
8
What are moral guidelines that govern the use of computers and information systems Computer Ergonomics Computer Ethics Computer Intellectual Rights Computer Privacy Guidelines
9
An applied science devoted to comfort, efficiency, and safety in the work place Relaxation Encrypting Ergonomics Slacking
10
A potentially damaging computer program Virus Worm Trojan Horse Spam To learn more about how computer viruses work, read the article from “How Stuff Works”. It’s a great article!article
11
This software program identifies and removes viruses Firewall Software Anti Piracy Software Ergonomics Software Anti Virus Software
12
What is a small file that is put on your computer that contains data about you? Cookie Trojan Horse Worm Virus To understand better how cookies work, read this article from “How Stuff Works”.this article
13
Watch this video on Internet cookies!
14
What copies itself repeatedly, using up computer resources and can possibly shut your computer & network down? Virus Trojan Horse Worm Cookie
15
The process of converting plaintext (readable data)into ciphertext (unreadable characters) Scrambling Phishing Spamming Encryption
16
What is it called when a computer consumes your entire social life? Computer addiction Computer ethics Computer ergonomics Computer spamming
17
Reducing electricity and environmental waste while using computers Salvaging Reprocessing Reclaiming Green computing
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.