Level 6 Level 8
Level 7


11 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

For security, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text, the receiver must also have the key.
Tricking someone for personal gain or to damage them.
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
Software that is designed to cause problems for users.
A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
Copying someone else's work and presenting it as your own.
Repetitive strain injury (RSI)
Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
Unwanted or junk email sent to lots of recipients at the same time.
Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
A program designed to cause other programs on a computer to malfunction or stop working altogether.