Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
RSI
|
(repetitive strain injury) is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
|
|
CVS
|
(computer vision syndrome) type of health-related condition due to computer usage.
|
|
ergonomics
|
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
|
|
computer addiction
|
occurs when the computer consumes someone's entire social life.
|
|
computer ethics
|
are the moral guidelines that govern the use of computers and information systems.
|
|
national press photographers
|
one group that completely opposes any manipulation of an image.
|
|
intelectual property rights
|
are the rights to which creators are entitled for their work.
|
|
copyright
|
gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
|
|
green computing
|
involves reducing the electricity and enviromental waste while using a computer.
|
|
energy star program
|
to help reduce the amount of electricity used by computers and related devices.
|
|
information privacy
|
refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
electronic profile
|
a profile that sends entered data across a network or the Internet.
|
|
cookie
|
is a small text file that a web server stores on your computer.
|
|
spyware
|
is a program placed on a computer without the user's knowledge that secretly collects information about the user.
|
|
adware
|
is a program that displays an online advertisement in a banner or pop-up window on web pages, e-mail messages, or other internet services.
|
|
spam
|
is an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
|
|
phishing
|
is a scam, in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.
|
|
pharming
|
is a scam, similiar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
|
|
social engineering
|
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
|
employee monitoring
|
involves the use of computers to observe, record and review an employees use of a computer, including communications such as e-mail messages, keyborad activity, and web sites visited.
|
|
content filtering
|
is the process of restricting access to certain material on the web.
|