Download presentation
Presentation is loading. Please wait.
Published byMaximillian Houston Modified over 9 years ago
1
Mrs. Jefferson Business Information Management I
2
Cyberbullying Sexting Computer Virus Hacker Identity Theft E-mail Scam Router Firewall Intellectual Property Copyright Piracy Fair Use Plagiarism
3
When one uses computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
4
The creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic device
5
A computer program which replicates and spreads itself from one computer to another
6
Originally refers to someone who is an expert at computer programming and who is able to solve computer problems, but also means someone who illegally gains access to others’ computer for their own profits
7
A crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain
8
A fraud which involves stealing personal information for financial gain through e-mail
9
A computer device which forwards data packets from one network to another
10
A piece of software or program designed to protect computers from viruses
11
Ownership of any creative work or invention
12
Granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
13
The unauthorized reproduction or distribution of copyrighted materials, information or production
14
An exception to copyright infringement
15
The use of other people’s words, thoughts or ideas without crediting the source
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.