Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

21 Cards in this Set

  • Front
  • Back
(Repetitive Strain Injury)
An injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
(Computer Vision Syndrome)
Sore, tired, burning, itching, or dry eyes.
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Computer Addiction
Occurs when the computer consumes someone's entire social life.
Computer Ethics
The moral guidelines that govern the use on computers and information.
National Press Photographers
A group that completely opposes and manipulation of an image.
Intellectual Property Rights
Refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names and logos.
Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
Green Computing
Involves reducing the electricity and environmental waste while using a computer.
Energy Star Program
(government mandated) Helps reduce the amount of electricity used by computers and related devices.
Information Privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Electronic Profile
Everytime you click an advertisement on the web or register software online, the information and preferences enter a database.
A small text file that a web server stores on your computer.
A program placed on a computer without a users knowledge that secretly collects information about the user.
A program that displays an online advertisement in a banner or pop-up window on webpages, e-mail messages, or other internet services.
An unsolicited e-mail message or newsgroup posting sent to multiple recipients r news groups at once.
A scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
A scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
Social Engineering
Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and tha naivety of others.
Employee Monitoring
Involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity, and web sites visited.
Content Filtering
The process of restricting access to certain material on the web.