Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
repetitive strain injury
|
injury or disorder of the muscles nerves tendons ligaments and joints
|
|
computer vivsion syndrome
|
Eyestrain due to prolonged computer usage.
|
|
ergonomics
|
The science of incorporating comfort, efficiency, and safety into the design of the workplace.
|
|
computer addiction
|
Growing health problem that occurs when the computer consumes someone's entire social life.
See page589 |
|
computer ethics
|
Moral guidelines that govern the use of computers and information systems.
|
|
intellectual property rights
|
Rights to which creators are entitled for their work.
|
|
copyright
|
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
|
|
greem computing
|
Computer usage that reduces the electricity and environmental waste involved in using a computer.
|
|
energy STAR program
|
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices.
|
|
information privacy
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
cookie
|
Small text file that a Web server stores on a computer
|
|
spyware
|
Program placed on a computer without the user's knowledge that secretly collects information about the user.
|
|
adware
|
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
|
|
spam
|
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
|
|
phishing
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
|
|
pharming
|
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
|
|
social engineering
|
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
|
employee monitering
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
|
content filtering
|
Process of restricting access to certain material on the Web.
|