Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
Network
|
computers connected all over the world by internet
|
|
Client
|
a workstation on a network that gains access to central data files
|
|
Internet
|
a wholw bunch of networks that connects people and businesses
|
|
web or www
|
world wide web contains texts graphics audio and video
|
|
phishing
|
using emails that look real and posting real websites that are not to steal someones ID
|
|
web 2.0
|
webs where people can share post personal information and modify information
|
|
GUI
|
graphical user interface able to interact with software
|
|
icon
|
picture and desktop that can be used as a command
|
|
System software
|
has programs that maintain and control the computer
|
|
application software
|
coordinating all the things going on the computer in hardware devices makes people productive
|
|
Network
|
computers connected all over the world by internet
|
|
Network
|
computers connected all over the world by internet
|
|
Client
|
a workstation on a network that gains access to central data files
|
|
Client
|
a workstation on a network that gains access to central data files
|
|
Network
|
computers connected all over the world by internet
|
|
Internet
|
a wholw bunch of networks that connects people and businesses
|
|
Client
|
a workstation on a network that gains access to central data files
|
|
Internet
|
a wholw bunch of networks that connects people and businesses
|
|
web or www
|
world wide web contains texts graphics audio and video
|
|
Internet
|
a wholw bunch of networks that connects people and businesses
|
|
web or www
|
world wide web contains texts graphics audio and video
|
|
phishing
|
using emails that look real and posting real websites that are not to steal someones ID
|
|
web 2.0
|
webs where people can share post personal information and modify information
|
|
phishing
|
using emails that look real and posting real websites that are not to steal someones ID
|
|
web or www
|
world wide web contains texts graphics audio and video
|
|
web 2.0
|
webs where people can share post personal information and modify information
|
|
GUI
|
graphical user interface able to interact with software
|
|
GUI
|
graphical user interface able to interact with software
|
|
icon
|
picture and desktop that can be used as a command
|
|
phishing
|
using emails that look real and posting real websites that are not to steal someones ID
|
|
web 2.0
|
webs where people can share post personal information and modify information
|
|
System software
|
has programs that maintain and control the computer
|
|
icon
|
picture and desktop that can be used as a command
|
|
application software
|
coordinating all the things going on the computer in hardware devices makes people productive
|
|
GUI
|
graphical user interface able to interact with software
|
|
System software
|
has programs that maintain and control the computer
|
|
icon
|
picture and desktop that can be used as a command
|
|
application software
|
coordinating all the things going on the computer in hardware devices makes people productive
|
|
System software
|
has programs that maintain and control the computer
|
|
application software
|
coordinating all the things going on the computer in hardware devices makes people productive
|
|
utility/utility program
|
allows you to do maitenance on a computer
|
|
loading
|
process of uploading something bringing it up
|