Part of the Deep Web that cannot be accessed with a regular web browser and consist of anonymously hosted websites.
What is the Dark Web?
This provides a way for people to use portions of a copyrights work.
What is fair use?
Criminal action perpetuated primarily using a computer.
What is cybercrime?
A program that gathers information about you while on the web without your knowledge.
What is spyware?
The use of computer for non-work related activities when an individual is at work is called _______.
_______ enables copyright holders to grant certain rights to the work.
What is copyleft?
Violations of a holders rights is called ______.
What is copyright infringement?
What is computer viruses?
Typical a two-factor authentication involve _______ and ________.
What is a password and an ID card/fingerprint/security question & answer/biometric scan?
A computer controlled by a hacker.
What is a zombie?
It is considered works without copyright protection.
What is public domain?
The illegal use of copyrighted software is called ______.
What is software piracy?
A program that enable a hacker to gather information and steal your logons and passwords is a _______ ________.
What is packet analyzer?
Small text files contain information about you when you surf some web sites.
What are cookies?
A program that allows a hacker to gain access to your computer without your knowledge.
What is a rootkit?
________ are stories that are invented and are intended to spread misinformation.
What is fake news?
This enables direct anonymous transactions between users.
What is cryptocurrency?
A _____ _____ ________ is configured in a firewall to ignore all incoming packets that request access to a particular port.
A type of backup that ensures a complete snapshot of all that makes your computer run.
What is an image?
Work is created and fixed into a digital or physical form is considered starts the _________ protection.
What is copyright?
__________ begins when a work is created and fixed into a digital or physical form.
What is copyright?
_________ incorporates into society as true events even though they are not.
What is urban legends?
____ floods a computer with request until it shuts down.
What is a DDOS (distributed denial of service)?
What is a firewall?
Part of the internet that cannot be found using a search engine is called _____.
What is Deep Web?