Fluency with information technology - Chapter 11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Crowdsourcing

refers to solving a problem by combining the contributions of a large unconstrained volunteer population

2
New cards

Netiquette

the correct or acceptable way of communicating on the Internet.

3
New cards

Flame War

A flame war is a heated argument in a social media outlet such as a web forum, mailing list or chat room, in which intentionally insulting comments and personal attacks become a focus of conversation.

4
New cards

automated reply

a function of mail servers that allows a user to set up a message saying that he or she is temporarily away and unable to reply to emails

5
New cards

vacation message

term that early mailers used for an automated reply

6
New cards

Cleartext

The unencrypted form of data. Also known as plaintext

7
New cards

encrypted

information that has been recoded to hide it's meaning

8
New cards

Ciphertext

A string of text that has been converted to a secure form using encryption.

9
New cards

one way cipher

encryption system that cannot be easily reversed (used for passwords)

10
New cards

superuser

Name for the system administrator

11
New cards

spam filter

software that separates legitimate mail from spam

12
New cards

advance fee fraud

the perpetrator offers to share the proceeds of some large payoff with the victim if the victim will make a "good faith" deposit or provide some partial funding first.

13
New cards

419 Fraud

advance fee fraud; named after it's section number in the Nigerian criminal code

14
New cards

Phishing

the term for the social engineering process of convincing people to give up their information voluntarily

15
New cards

phishing

Password harvesting fishing

16
New cards

intellectual property

something created while working for a company

17
New cards

software license

The document that contains permission for a buyer to install and use a program.

18
New cards

Shareware

A copyrighted software that can be sampled before it is purchased.

19
New cards

proprietary

software where the source code is private

20
New cards

Open Source

Software that is created for free use by everyone

21
New cards

Copyright

a document granting exclusive right to publish and sell literary or musical or artistic work

22
New cards

public domain

Creative work that's not copyrighted and therefore free for you to use whenever you want.

23
New cards

fair use

the conditions under which you can use material that is copyrighted by someone else without paying royalties

24
New cards

creative commons

A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.

25
New cards

When you forget your password

the system administrator gives you a one-time password to use and then prompts you to create a new password

26
New cards

written permission

copyrighted material may be used only when ____ is granted

27
New cards

the law

if you commit a crime on the internet ______ can determine your identity

28
New cards

one

when emailing, how many topics should you limit each individual email to?

29
New cards

only you

when using a one way cipher, who knows your password

30
New cards

security questions

Under most circumstances, what prevents a stranger from resetting your user password?

31
New cards

private

most people assume that when you send an email it is ____

32
New cards

reverse

you should answer a backlog of emails in_____order

33
New cards

no

can passwords styled in systems using a 1-way cipher be recovered?

34
New cards

facts

What cannot be copyrighted?

35
New cards

Nettiquette

______ is etiquette for the internet

36
New cards

automated reply

A(n) _____ is a programmed response to your email that's sent while you're away

37
New cards

superuser

the individual who controls access to a computer system

38
New cards

intellectual property

______ are nonmaterial human creations that people can claim ownership to

39
New cards

derivative

new work created from existing work is called_____

40
New cards

public domain

information in the _______ is free for anyone to use

41
New cards

lease

you don't buy software, you ______ it

42
New cards

encrypted

computers store passwords but they are ________ for security