A(n) _____ program captures screen images
Hardware and/or software that protects computers from outsides is...
_____ scrambles the contents of a file so you can't read it...
_____ is the right to be left alone when you want to be, to have...
____- are the principles and standards that guide our behavior toward...
_____ are generally very knowledgeable computer users who use their...
_____ is a program, that when installed on a computer, records every...
An ethical ______ is when one's responsibilites seem to lead in...
With respect to the circumstances that surround making an ethical...
_____ is intangible creative work that is embodied in physical form.
_____ software is the unauthorized use, duplication, distribution or...
_____ is unsolicited e-mail that advertises goods and services.
A(n) _____ records information about you during a Web surfing session...
A hacker who has been stealing credit card number would be considered...
_____ is an encryption system that uses two keys: a public key that...
_____ is software that comes hidden in free downloadable software and...
_____ software detects and removes or quarantines computer...
_____ use physical characteristics to assess access rights.
The _____ says that you may use copyrighted material in certain...
A(n) _____ is a small record deposited on your hard disk by a Web site...
A(n) _____ attack floods a Web site with so many requests for service...
With respect to the circumstances that surround making an ethical...
A(n) _____ consists of one line of information for every visitor to a...
With respect to the circumstances that surround making an ethical...
_____ occurs when someone forges your identity for fraudulent...
_____ is a hardware device that captures keystrokes on their journey...
_____ crime in general, accounts for at least $ billion in losses...
A(n) _____ is a type of virus that spreads itself, not just from file...
_____ is software to generate ads that installs itself on your...
At the innermost middle ring of your ethical structure you are faced...
With respect to the circumstances that surround making an ethical...
_____ law protects an idea.
A(n) _____ examines information passing through switches, hubs, or...
_____ is the legal protection afforded an expression of an idea, such...
In 2001, the FBI acknowledged an enhancement to DCS-1000 called _____,...
With respect to the circumstances that surround making an ethical...
With respect to the circumstances that surround making an ethical...
_____ cookies start out as a unique cookie, but the original site sold...
_____ software is software you do not want hidden inside software you...
Many Web sites are offering programs, collectively referred to as...
A(n) _____ is a type of hacker who is engaged in corporate espionage
_____ is a technique which reroutes your request for a legitimate Web...
_____ is a technique used to gain personal information for the purpose...