Level 6 Level 8
Level 7

Issues


11 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Encryption
For security, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text, the receiver must also have the key.
Fraud
Tricking someone for personal gain or to damage them.
Hacker
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
Malware
Software that is designed to cause problems for users.
Phishing
A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
Plagiarism
Copying someone else's work and presenting it as your own.
Repetitive strain injury (RSI)
Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
Spam
Unwanted or junk email sent to lots of recipients at the same time.
Spyware
Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
Trojan
A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
Virus
A program designed to cause other programs on a computer to malfunction or stop working altogether.