Ethics Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

acceptable use policy

a set of guidelines or rules adopted by a school or other organization that governs Internet, network, and information technology use

2
New cards

computer crime

a crime committed using a computer, usually to gain access to restricted files, systems, or information; these crimes can resemble trespassing, vandalism, or theft

3
New cards

computer virus

a small, intentionally, created computer program that causes damage to computer workstations, personal computers, or computer networks; this is a generic term that also includes worms, trojan horses, and bombs

4
New cards

data privacy

the concept that an individual has a right to say who has personal information about him or her and how that information is used; with the spread of digital information gathering and recordkeeping, it is becoming more difficult to maintain

5
New cards

flame

an emotionally, often profane, response to an action or statement in a chat-room, electronic discussion group, or newsgroup

6
New cards

hacker/cracker

an individual who gain unauthorized access to computerized information or computer systems; the term “cracker” implies there is malicious intent to the access

7
New cards

intellectual property rights

the concept that a person’s ideas, writings, and constructions (like computer software) that may not exist in a physical sense should be treated as property and the creators or owners of this property have rights to its sale, use, and control

8
New cards

netiquette

a term taken from a combination of “network” and “etiquette”’ that means a code of polite, thoughtful, or respectful behaviors to be followed while using networks, including the Internet

9
New cards

newbie

a new user of networked resources

10
New cards

peer-to-peer file sharing

a type of file that allows computer users with the same program to connect with each other and access files from one another’s hard drives rather from a central server; napster, gnutella, kazaa, and limewire are examples of this type of software

11
New cards

plagiarism

the use of another’s ideas or words as one’s own

12
New cards

spoofing

the use of another’s identity when online

13
New cards

virtual space

the environment created by computer networks in which data is stored and communication transpires; also termed “‘cyberspace”

14
New cards

piracy

illegal using, copying, sharing (etc.) computer software protected by copyright laws

15
New cards

counterfeiting

creating fake softwares, hardwares, parts, programs, etc.

16
New cards