1) voip a) A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. b) A new language that speeds up phone calls using a broadband Internet connection. c) A very important person that can be contacted online. 2) Cyberjunkie a) A piece of malware that can replicate itself in order to spread the infection to other connected computers. b) A person who is addicted to computers or the Internet. c) A letter or email, usually advertising products or services, that is sent to people although they have not asked to receive it. 3) portal a) A website or web page providing access or links to other sites. b) An audio or video clip that has been edited and manipulated to seem real or believable. c) A large and often highly decorated building. 4) hypertext a) The words written in the upper part of a book, magazine, etc. b) Malicious code that is hidden in a computer program or file that may appear to be useful, or at the very least harmless. It is used for the installation of malware. c) Text displayed on a computer display or other electronic devices with references (hyperlinks) to other text that the reader can immediately access. 5) MMORPG a) The moment a hacker successfully exploits the vulnerability of a computer, to gain access to its files. b) A massively multiplayer online role-playing game. c) A cybercrime technique used by hackers to create fake websites or email messages similar to those of well-known companies. 6) netizen a) An Internet user, especially a habitual or a keen one. b) A technique used by cybercriminals to redirect victims to fake websites behind their back. c) A software that is installed on a device without the end user's knowledge. It aims to steal personal or sensitive information by performing a set of operations covertly. 7) coaxial cable a) A way to get into a system, product, or device by installing software or configuring the software to bypass existing security mechanisms. b) A mathematical term for functions that share an axis. c) A transmission line for high-frequency signals. 8) peer- to-peer a) Activity involving sharing files or other resources between computers connected through a network, rather than using a central server. b) A person who loves talking to other people in socials. c) A spyware or monitoring software that keeps track of every key typed on your keyboard. 9) sysadmin a) The activity which involves the ability to manage or organize online business. b) A person responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. c) A crime committed while using a computer and the Internet to steal a person's identity or stalk victims with malevolent programs. 10) Anticomputer tactics a) The activity of using a computer to access information stored on another computer system without permission, or to spread a computer virus. b) A cyber attack that causes a sudden blackout that damages the computer. c) Methods used by humans to try to beat computer opponents at various games, especially in board games such as chess and Arimaa. 11) Tymnet a) An international data communications network headquartered in Cupertino, California. One of the first internet hubs. b) A spy who makes uninvited inquiries into other people’s private affairs. c) The part of an Internet address that shows it belongs to a network or a business. 12) cyber lingo a) Words and letters used, when communicating online, to shorten the amount of letters you have to type, to get a point across, or to describe what you mean, or what you are doing. b) The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details or other sensitive details, pretending to be a trustworthy entity in digital communication. c) High-speed data transmission system where the communications circuit is shared between multiple users.

Classifica

Stile di visualizzazione

Opzioni

Cambia modello

Ripristinare il titolo salvato automaticamente: ?