A _______ is a program that allows a user to find, view, hear, and interact with material on the Internet.
A computer _______ is a group of interconnected computers.
A ____ Room is a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the room.
A computer ____ can be considered as the modern counterpart of a paper document which traditionally was kept in offices.
Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
____ is a method of writing, sending, receiving and saving messages over an electronic communication system such as the Internet.
Always include a clear and specific _______ line in your email.
_______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
__________ is the scrambling of data into a secret code that can be read only by software set to decode the information.
Don’t share your user __
A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and block communications to and from sources you don’t permit.
A ______ is a segment of Internet space denoted by the function or type of information it includes. Current ones include “.com” for commercial sites, “.gov” for governmental ones, and “.org” for non-commercial organizations.
A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory.
A Complex Password must be at least ____ characters long.
Before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want to become publicly available?”
A _______ Password contains at least 3 of the 4 following characters:Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g.123), Special/Non-Alphanumeric (e.g. ! $ # %).
To ______ the amount of spam you receive, be careful who you give your email address to.
Only _____ invalid login attempts are permitted before the account is locked.
A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
Always check your and in your email before sending it.
Email ____, also known as unsolicited bulk email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
Never use email for any _______ or unethical purpose.
________ is a scam that involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims.
The __ Address is a computer’s “address” and consists of a series of numbers separated by periods.
______ is a type of software that often comes with free downloads.Sometimes it displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.