Know Your Computer💻⌨🖥 Flashcards

(53 cards)

1
Q

Sexting

A

The use of cellphones to send sexual messages, pictures, and videos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filtering Software

A

Different methods to screen unwanted Internet content including whitelisting, blacklisting, monitoring activity, keyword recognition, or blocking-specific functions such as E-Mail or Instant Messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall

A

This is a system that creates a special “wall” used by network servers to separate their Intranet from the Internet. It keeps out unwanted information like spam and viruses and unwanted people like hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Search Engine

A

A program that searches information on the World Wide Web by looking for specific keywords and returns a list of information found on that topic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm

A

A subclass of virus which generally spreads without user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

History

A

A list of websites the people, using a particular computer, have visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Network Site

A

An online community where people from all over the world may meet and share common interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

A computer program that can destroy files or make your computer “crash.” They can be sent via E-Mail or through other file-sharing programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranet

A

A private network inside a company or an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cache

A

A big, but fast memory that transparently improves the performance of a larger, but slower memory or storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network

A

This is created when computers are connected, allowing people to share information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hypertext Markup Language (HTML)

A

The coded format language used for creating documents on the World Wide Web and controlling how web pages appear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Netiquette

A

Courtesy, honesty, and polite behavior practiced on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

An online scam that uses email to get a users’ private information by imitating legitimate companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacker

A

A popular term for someone who accesses computer information either legally or illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies

A

Websites use this to store information on your browser, such as log-in or registration identification, user preferences, and online shopping-cart information

Can be used to customize the display you see through your browser or keep track of the different pages within the site you have visited

They expire after some time, but cache is kept in the client’s machine until they are removed manually by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chat Room

A

An interactive forum where you can talk in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Blog

A

An online journal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

The strings of letters and numbers that have to be typed in on some web pages before something can be saved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False, Cloud storage providers generally let users upload any size and type of computer file, whereas email attachments also have limitations

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pharming

A

An online scam that attacks the browser’s address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Browser

A

A program that allows users to view web pages

23
Q

A meme

A

A modern-day fable or parable that spreads rapidly on the Internet.

24
Q

Icons

A

Small pictures that represent the programs on your computer

25
CPU (Central Processing Unit)
Stores the disk operating system and the hard drive
26
Address
A series of of letters and numbers that identify a location
27
Webcams
Also known as "cams," are video cameras set up on home computers or laptops that can be accessed via the World Wide Web
28
Cyberbullying
Bullying through the Internet applications and technologies such as instant message (IM), social networking sites, and cell phones
29
URL (Uniform Resource Locator)
The specific location or address of material on the Internet
30
Function Keys
Other than the alpha/numeric keys, are the keys that allows the user to perform special functions such as accessing software options
31
Chat Acronyms
Acronyms used to communicate, usually through instant and/or text messaging
32
Geolocation
The identification of the real-world geographic location of an object, such as a radar, mobile phone, or an Internet connected computer terminal
33
Spyware
Software that secretly monitors computer activity, attempting to gain private information without the computer user knowing
34
Attachment
A file that can be added to an e-mail, like a document, photograph, or song
35
Plug in
Extends the capabilities of your browser
36
Podcasts
An audio show that is broadcasted over the web that may include talk shows, music, or other types of audio
37
Input Peripherals
Keyboard Mouse Scanner
38
Output Peripheral
Monitor | Printer
39
How to protect your computer from viruses and/or hacking
- Don't open any unknown emails from an unknown email address - Don't click on any ads - Don't download any unknown apps/files
40
MLA-Style
Modern Language Association of America is a style of typing essays, emails, etc
41
What does malware seek to do?
1. Vandalize your computer in someway 2. Steal your private information 3. The remote control of your computer for other ends 4. Manipulate you into purchasing something 5. These programs are the time bombs and wicked minions of dishonest programmers
42
MLA Formatting Guidelines
1" margins on all sides Double spaced Two spaces at the end of each sentence Heading at the top left had corner - -Name - -Teacher - -Class Title - -Date Page number at the top right hand corner with your last name in front of the number Title of the report is centered 1/2" indentations at the beginning of every paragraph Parenthetical references Long quotations are longer than four lines and are indented one inch Section headings are underlined
43
Works Cited
This title has to be centered 1/2" hanging indent Alphabetically in order by authors' last name
44
Block Format
No indent 2" start at the top Double space between all parts ---except for after the date and closing (quadruple space) D fault margins
45
Parts of a letter
Return Address (to) Date Letter Address (from) Salutations Body Complimentary Close Name of Writer Subject Line Reference Initials - ---person who typed it, not the person who wrote it (all lowercase - ---and no punctuation) Attachment or Enclosure Notation
46
Personal Business Letter
A letter written by an individual to deal with a business Return address is keyed first ---Street, then city, then address
47
Business Letter
From a person representing a business Return address appears on the letter head (stationary) Date begins letter 2" from the top
48
Envelope Format
``` USPS ---United States Postal Service All CAPITAL letters No punctuation so City, State, and zip on the same line Use 2 letter state abbreviation ```
49
Table
A systematic arrangement of data in rows and columns
50
Table Format
Side margins must be equal Aesthetically pleasing Get your points across
51
Parts of a table
``` Main Heading (could use all caps) Second Heading (possibly title case) Column Headings (line up its data) Body Source Line (credit where credit is due) Total line (if necessary) ```
52
Excel
Absolute cell reference will remain constant ($$) Relative cell reference will change in the relationship between cells Rows and columns Copy and fill Formulas Format
53
Download
Information retrieved from the Internet, discs or CDs, and other computers, which you can use or save to your computer