Term
|
Definition
| software that processes ingormation on its own without human intervention. |
|
|
Term
| Biometric security measures |
|
Definition
| Examination a fingerprint, a voice pattern, or the iris or retina of the eye for identification purposes |
|
|
Term
|
Definition
| using the computer as a tutor |
|
|
Term
|
Definition
| a criminal act that is committed through the use of a computer, such as getting into someone else's system and changing information or creating a computer virus. It can also involve the theft of computer equipment |
|
|
Term
|
Definition
| invading someones else's computer, usually for personl gain or just for the satisfaction of invading someone else's computer |
|
|
Term
|
Definition
| manipulation of a computer or computer data in order to obtain money, property, or value dishonesty or to cause loss |
|
|
Term
|
Definition
| the exclusive right granted by law for a certon number of years, to make or dispose of litary, musical, or artistic work |
|
|
Term
|
Definition
| changing data before of after it has been entered into the computer |
|
|
Term
|
Definition
| taking a course online over the internet without having to meet in a traditional classroom |
|
|
Term
|
Definition
| allows someone to pay by transmiting a number from one computer to another |
|
|