Compter Security
The Informatin Age
Guidelines
100
A malicious software program that hides within or is designed to look like a legitimate program.
What is Trojan horse?
100
The right of individuals and organizations to deny or restrict the collection and use of information about them.
What is information privacy?
100
Never provide links to sites tha are not for K-12 students or educational settings.
What is true?
200
A program that copies itself repeatedly in a computer memory.
What is a worm?
200
An unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
What is spam?
200
A posting or sending of detrimental or cruel text.
What is cyberbullying?
300
A program that activates when it detects a certain condition.
What is a Logic bomb?
300
Spam sent via Internet telephony.
What is a split?
300
Tools that can be used to prevent their childern from accessing pornographic.
What is parental controls?
400
A designed to detect, disinfect, and protect computers and networks from viruses.
What is an anti-virus program?
400
A service that blocks e-mails messages from designated sources.
What is an e-mail filtering?
500
A CD-Rom that contains an uninfected copy of key operating system commands and strat-up information that enables the computer to restart correctly.
What is a resuce disc?
500
It means the original author or creator of the work retains ownership of the work and has eht exclusive right to reproduce and distribute the creative work.
What is a copyright?