Most common type of long-term storage … use thick, magnetic disks encased in a protective housing to store data
What is a Hard Drive?
observing rules of "netiquette" that promote online civility
What is Civility?
This is where you can type the address for the website you want to visit. Another name for a web address is the URL, or Uniform Resource Locator.
What is the address bar?
refers to using somebody else's hardware over the Internet to do computing tasks. Common uses include file storage, website hosting, web applications, social media, and gaming services.
What is Cloud Computing?
control the flow of network traffic and protect systems from unauthorized network connections. They are configured with a set of rules that define what kind of traffic is allowed and what kind is not allowed.
What are Firewalls ?
AKA CPU... is the brains of the computer where most calculations take place. It is an integrated circuit that processes instructions sent from the operating system and software programs.
What is the Central Processing Unit?
respecting the privacy and dignity of other human beings
What is Human Dignity?
This button will hide the browser window but keep it running and available on the taskbar at the bottom of the screen.
What is the Minimize (Minimize button)?
transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams.
What is Live Streaming?
is when a computer requires someone to prove they are who they say they are. Usernames and passwords are the most common method
What is Authentication?
The main software program that controls computer processing, software application execution, and integration and operation of computer peripherals, devices, and hardware. Examples are Microsoft Windows 10, Linux, and OS X.
What is the Operating System?
protecting confidential data and information.
What is Confidentiality?
technology that provides wireless Internet connectivity through wireless router. Uses radio waves to transmit data within a particular area referred to as a hotspot.
What is WiFi?
Technologies that help people share their lives with other people over the Internet. Generally, the user creates a unique profile with information about themselves. This information can include photographs, biographical information, work and education history, likes and dislikes, political ideology, religion, and much more.
What is Social Media?
emails are crafted to appear as though they were sent from a legitimate organization, such as a bank or an ecommerce website. They convince the user to click a link that takes them to a malicious website where they are tricked into providing sensitive information.
What is Phishing?
Integrated circuits used to store computer data, user data, and program data during computer processing. There are two general classifications of computer memory: volatile memory and non-volatile memory. Volatile memory is erased whenever power is lost.
What is Memory or Random Access Memory (RAM)?
a set of rules or standards you adopt that dictate how you act. As you work with computers, you will be required to make moral decisions in a variety of situations with many degrees of complexity.
What is Code of Ethics?
Manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, they manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.
What is Internet Service Provider (ISP)?
a personalized message that is automatically included at the bottom of a new email. They often include personal information such as name, job title, and phone number.
What is a Signature?
Microsoft’s anti-malware product that is preinstalled on most new computers with Windows 10.
What is Windows Defender?
Special programs that tell the operating system how to communicate with the computer's hardware
What are Drivers?
Involves obeying laws that regulate how computers are used. For example, installing key-logger software on your instructor's computer to obtain her password is a violation of the law, which could subject you to prosecution.
What is Legal Compliance?
Refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies.
What is the Internet of Things?
someone who deliberately tries to create conflict among users. Expressing your opinion is encouraged on the Internet; however, they are not usually interested in engaging in a healthy dialog. Instead, they seek to cause contention and disrupt the conversation
What is a Troll?
algorithms scramble signals to make them unreadable to anyone who doesn't have the correct key to unscramble them. Even if a criminal intercepts an encrypted signal, they won't be able to understand the information.
What is Encryption?