Know Your Computer💻⌨🖥 Flashcards

1
Q

Sexting

A

The use of cellphones to send sexual messages, pictures, and videos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filtering Software

A

Different methods to screen unwanted Internet content including whitelisting, blacklisting, monitoring activity, keyword recognition, or blocking-specific functions such as E-Mail or Instant Messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall

A

This is a system that creates a special “wall” used by network servers to separate their Intranet from the Internet. It keeps out unwanted information like spam and viruses and unwanted people like hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Search Engine

A

A program that searches information on the World Wide Web by looking for specific keywords and returns a list of information found on that topic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm

A

A subclass of virus which generally spreads without user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

History

A

A list of websites the people, using a particular computer, have visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Network Site

A

An online community where people from all over the world may meet and share common interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

A computer program that can destroy files or make your computer “crash.” They can be sent via E-Mail or through other file-sharing programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intranet

A

A private network inside a company or an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cache

A

A big, but fast memory that transparently improves the performance of a larger, but slower memory or storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network

A

This is created when computers are connected, allowing people to share information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hypertext Markup Language (HTML)

A

The coded format language used for creating documents on the World Wide Web and controlling how web pages appear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Netiquette

A

Courtesy, honesty, and polite behavior practiced on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

An online scam that uses email to get a users’ private information by imitating legitimate companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacker

A

A popular term for someone who accesses computer information either legally or illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies

A

Websites use this to store information on your browser, such as log-in or registration identification, user preferences, and online shopping-cart information

Can be used to customize the display you see through your browser or keep track of the different pages within the site you have visited

They expire after some time, but cache is kept in the client’s machine until they are removed manually by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chat Room

A

An interactive forum where you can talk in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Blog

A

An online journal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAPTCHA

A

The strings of letters and numbers that have to be typed in on some web pages before something can be saved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False, Cloud storage providers generally let users upload any size and type of computer file, whereas email attachments also have limitations

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pharming

A

An online scam that attacks the browser’s address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Browser

A

A program that allows users to view web pages

23
Q

A meme

A

A modern-day fable or parable that spreads rapidly on the Internet.

24
Q

Icons

A

Small pictures that represent the programs on your computer

25
Q

CPU (Central Processing Unit)

A

Stores the disk operating system and the hard drive

26
Q

Address

A

A series of of letters and numbers that identify a location

27
Q

Webcams

A

Also known as “cams,” are video cameras set up on home computers or laptops that can be accessed via the World Wide Web

28
Q

Cyberbullying

A

Bullying through the Internet applications and technologies such as instant message (IM), social networking sites, and cell phones

29
Q

URL (Uniform Resource Locator)

A

The specific location or address of material on the Internet

30
Q

Function Keys

A

Other than the alpha/numeric keys, are the keys that allows the user to perform special functions such as accessing software options

31
Q

Chat Acronyms

A

Acronyms used to communicate, usually through instant and/or text messaging

32
Q

Geolocation

A

The identification of the real-world geographic location of an object, such as a radar, mobile phone, or an Internet connected computer terminal

33
Q

Spyware

A

Software that secretly monitors computer activity, attempting to gain private information without the computer user knowing

34
Q

Attachment

A

A file that can be added to an e-mail, like a document, photograph, or song

35
Q

Plug in

A

Extends the capabilities of your browser

36
Q

Podcasts

A

An audio show that is broadcasted over the web that may include talk shows, music, or other types of audio

37
Q

Input Peripherals

A

Keyboard
Mouse
Scanner

38
Q

Output Peripheral

A

Monitor

Printer

39
Q

How to protect your computer from viruses and/or hacking

A
  • Don’t open any unknown emails from an unknown email address
  • Don’t click on any ads
  • Don’t download any unknown apps/files
40
Q

MLA-Style

A

Modern Language Association of America is a style of typing essays, emails, etc

41
Q

What does malware seek to do?

A
  1. Vandalize your computer in someway
  2. Steal your private information
  3. The remote control of your computer for other ends
  4. Manipulate you into purchasing something
  5. These programs are the time bombs and wicked minions of dishonest programmers
42
Q

MLA Formatting Guidelines

A

1” margins on all sides

Double spaced

Two spaces at the end of each sentence

Heading at the top left had corner

  • -Name
  • -Teacher
  • -Class Title
  • -Date

Page number at the top right hand corner with your last name in front of the number

Title of the report is centered

1/2” indentations at the beginning of every paragraph

Parenthetical references

Long quotations are longer than four lines and are indented one inch

Section headings are underlined

43
Q

Works Cited

A

This title has to be centered

1/2” hanging indent

Alphabetically in order by authors’ last name

44
Q

Block Format

A

No indent

2” start at the top

Double space between all parts
—except for after the date and closing (quadruple space)

D fault margins

45
Q

Parts of a letter

A

Return Address (to)

Date

Letter Address (from)

Salutations

Body

Complimentary Close

Name of Writer

Subject Line

Reference Initials

  • —person who typed it, not the person who wrote it (all lowercase
  • —and no punctuation)

Attachment or Enclosure Notation

46
Q

Personal Business Letter

A

A letter written by an individual to deal with a business
Return address is keyed first
—Street, then city, then address

47
Q

Business Letter

A

From a person representing a business
Return address appears on the letter head (stationary)
Date begins letter 2” from the top

48
Q

Envelope Format

A
USPS
---United States Postal Service 
All CAPITAL letters
No punctuation so
City, State, and zip on the same line
Use 2 letter state abbreviation
49
Q

Table

A

A systematic arrangement of data in rows and columns

50
Q

Table Format

A

Side margins must be equal
Aesthetically pleasing
Get your points across

51
Q

Parts of a table

A
Main Heading (could use all caps)
Second Heading (possibly title case)
Column Headings (line up its data)
Body
Source Line (credit where credit is due)
Total line (if necessary)
52
Q

Excel

A

Absolute cell reference will remain constant ($$)
Relative cell reference will change in the relationship between cells
Rows and columns
Copy and fill
Formulas
Format

53
Q

Download

A

Information retrieved from the Internet, discs or CDs, and other computers, which you can use or save to your computer