Edit Game
unit 1 vocab. Orientation and Ethics
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   27  Close
A self-replicating program able to propagate itself across a network, typically having a detrimental effect.
Worm
An identification used by a person with access to a computer network.
Username
Viewing private accounts, messages, files or resources when one has not been given permission from the owner to do so.
Unauthorized access/use
A type of software license and a legal agreement that allows users to run the software package simultaneously.
Site license
The ability to control information one reveals about oneself over the internet and the ability to control who can access information.
Privacy
The unauthorized use or reproduction of another's work.
Piracy
A number allocated to an individual and used to validate electronic transactions.
PIN
The combination of characteristics or qualities that form an individuals distinctive character.
Personality
A string of characters or qualities that form an individuals distinctive character.
Password
A number of interconnected computers, machines, or operations.
Network
of or relating to seeing or sight.
Visual
Of, pertaining to, endowed with, or affecting the sense of touch.
Tactile
Pertaining to hearing to the sense of hearing, or to the organs of hearing.
Auditory
A shy person.
Introverted
An outgoing, gregarious person.
Extraverted
One of several approaches ar ways of learning that are presumed to allow an individual to learn best.
Learning style
A person who uses computers to gain unauthorized access to data.
Hacker
Software license agreement is a contract between "licensor" and purchaser of the right to use software.
EULA
Moral principles that govern a persons or groups behavior.
Ethics
The activity of converting data or information into code.
Encryption
The activity of making clear or converting from code into plain text.
Decryption
Any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime
Cybercrime
Software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
computer virus
Branch of practical philosophy which deals with how computing professionals should make decisions regarding professionals should make decisions regarding professional and social conduct.
computer ehtics
Portion of a hard disk, floppy disk, or similar data storage device that contains code for
Boot sector
Use of information that is expressly allowed under a licensing agreement.
Authorized use
Software used to prevent, detect, and remove malware, including computer viruses, worms and trojan horses.
Antivirus software