• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

cookie

is a small piece of data sent from a website and stored in the user's web browser while the user is browsing.

private browsing

allows a person to browse the Web without storing local data that could be retrieved at a later date.

social media

websites and applications that enable users to create and share content or to participate in social networking.

malware

software that is intended to damage or disable computers and computer systems.

direct wire transfer

can be made from onebank account to another bank account or through a transfer of cash at a cash office.

order number

reference number used in fulfillment to link a customer record on a computer file to the hard-copy order document that initiated the record. It usually consists of a document batch identification number and the order entry date.

hotspot

a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.

plug-in

is a software component that adds a specific feature to an existing computer program.

adobe flash player

is software used to stream and view video, audio and multimedia and Rich Internet Applications (RIA) on a computer or supported mobile device.

antivirus scanner

sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

two step varifaction

a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.

hacking

use a computer to gain unauthorized access to data in a system

spam

send the same message indiscriminately to (large numbers of recipients) on the Internet.

phishing

the activity of defrauding an online account holder of financial information by posing as a legitimate company.

random password

is software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password.

spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

virus

a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

authority

a person or organization having power or control in a particular, typically political or administrative, sphere.

currency

the fact or quality of being generally accepted or in use.

accuracy

the quality or state of being correct or precise.

objectivity

the quality of being objective.

usability

s the ease of use and learnability of a human-made object such as a tool or device

appropriateness

suitable or fitting for a particular purpose, person, occasion, etc