Pertaining to hearing to the sense of hearing, or to the organs of hearing.
Auditory
An identification used by a person with access to a computer network.
Username
of or relating to seeing or sight.
Visual
A number of interconnected computers, machines, or operations.
Network
Of, pertaining to, endowed with, or affecting the sense of touch.
Tactile
The ability to control information one reveals about oneself over the internet and the ability to control who can access information.
Privacy
The unauthorized use or reproduction of another's work.
Piracy
A self-replicating program able to propagate itself across a network, typically having a detrimental effect.
Worm
Use of information that is expressly allowed under a licensing agreement.
Authorized use
Software license agreement is a contract between "licensor" and purchaser of the right to use software.
EULA
The activity of converting data or information into code.
Encryption
Branch of practical philosophy which deals with how computing professionals should make decisions regarding professionals should make decisions regarding professional and social conduct.
computer ehtics
Software used to prevent, detect, and remove malware, including computer viruses, worms and trojan horses.
Antivirus software
A type of software license and a legal agreement that allows users to run the software package simultaneously.
Site license
Portion of a hard disk, floppy disk, or similar data storage device that contains code for
Boot sector
The combination of characteristics or qualities that form an individuals distinctive character.
Personality
Moral principles that govern a persons or groups behavior.
Ethics
The activity of making clear or converting from code into plain text.
Decryption
An outgoing, gregarious person.
Extraverted
A person who uses computers to gain unauthorized access to data.
Hacker
A string of characters or qualities that form an individuals distinctive character.
Password
One of several approaches ar ways of learning that are presumed to allow an individual to learn best.
Learning style
Viewing private accounts, messages, files or resources when one has not been given permission from the owner to do so.
Unauthorized access/use
A number allocated to an individual and used to validate electronic transactions.
PIN
Any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime
Cybercrime
Software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
computer virus
A shy person.
Introverted
Your experience on this site will be improved by allowing cookies.