Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
Adware
|
free software programs typically toolbars that work with your web browser that are advertiser supported
|
|
Anti-virus Software
|
Software used to prevent, detect, and remove Malware, including computer viruses, worms, and Trojan horses
|
|
Bandwidth
|
maximum amount of data that can travel a communications path in a given time, usually measured in seconds
|
|
Blog
|
similar to an electronic journal or diary
|
|
Cookie
|
used for an origin website to send state information to a user's browser
|
|
Cyberbullying
|
the act of one minor intimidating another minor via the Internet
|
|
Cybercrime
|
broadly refers to conducting criminal activity over the Internet
|
|
Cyberspace
|
virtual space where all electronic data resides
|
|
Digitize
|
to convert it from analog to digital
|
|
Download
|
the method by which users access and save or "pull down" software or other files to their own computers from a remote computer, usually via a modem.
|
|
E-mail
|
sent from one user to another via a network
|
|
End User
|
the person a particular software program is designed for
|
|
Flaming
|
reacting to someone's group posting or e-mail in a hostile manner by publicly chastising the person or bombarding the person with nasty e-mail
|
|
Flash
|
an animation and authoring program specifically developed for use on the Web by Adobe, Inc
|
|
Hacker
|
slang term for a technically sophisticated computer user who enjoys exploring computer systems and programs, sometimes to the point of obsession.
|
|
Intranet
|
an internal Internet designed to be used within the confines of a company, university, or organization
|
|
Intellectual Property
|
property that results from original creative thought, as patents, copyright material, and trademarks
|
|
Malware
|
describes a software program designed to wreck havoc on your computer
|
|
Online Predator
|
an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes
|
|
Phishing
|
an unscrupulous practice devised to lure you into revealing your bank accounts, passwords, credit card numbers, PIN codes and other sensitive data
|
|
Plug-in
|
small add-on piece of software that extends the capabilities of a web browser, such as Microsoft Internet Explorer or Fire fox, allowing the browser to run multimedia files
|
|
Shareware
|
a software that is freely distributed for a small fee paid on an "honor system."
|
|
Social Networking
|
websites that allow members to participate in online communities by creating personal profiles and interacting with other members
|
|
Spam
|
the practice of blindly posting commercial messages or advertisements to a large number of unrelated and uninterested groups and blogs, and bulk e-mailing unsolicited commercial messages
|
|
Spyware
|
the name given to a wide and growing range of software programs designed to steal your personal information
|
|
Streaming Media
|
refers to multimedia files, such as video clips and audio, that begin playing seconds after it is received by your computer from the World Wide Web
|
|
Trojan Horse
|
human-made software programs created specifically to wreak mischief on personal computers and networks
|
|
Uploading
|
transmitting it from your computer to a remote one
|
|
Virtual Reality
|
refers to computer simulations of real-world "environments" that use 3-D graphics and external devices like a data glove or helmet to allow users to interact with the simulation
|
|
Virus
|
a program created specifically to invade computers and networks and wreak havoc on them
|
|
Webmaster
|
a person in charge of maintaining a website
|
|
Wi-Fi
|
refers to a wireless networking standard developed by the Wi-Fi Alliance
|
|
Worm
|
human-made software program created specifically to wreak mischief on personal computers and networks
|
|
Zombie
|
A computer that has been secretly infected by a malicious software program
|