• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
RSI
Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
CVS
Eyestrain due to prolonged computer usage.
Ergonomics
The science of incorporating comfort, efficiency, and safety into the design of the workplace.
Computer Addiction
Growing health problem that occurs when the computer consumes someone's entire social life.
Computer Ethics
Moral guidelines that govern the use of computers and information systems.
Intellectual Property Rights
Unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
Copyright
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Green Computing
Computer usage that reduces the electricity and environmental waste involved in using a computer.
Energy Star Program
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices.
Info Privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
Cookie
Small text file that a Web server stores on a computer.
Spyware
Program placed on a computer without the user's knowledge that secretly collects information about the user.
Adware
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
Spam
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Phishing
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
Pharming
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
Social Engineering
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Employee Engineering
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.