Inside a Computer
Technology and Ethics
Navigating the Web
Sharing through Technology
Online Safety
100

Most common type of long-term storage  … use thick, magnetic disks encased in a protective housing to store data

What is a Hard Drive?

100

observing rules of "netiquette" that promote online civility

What is Civility?

100

This is where you can type the address for the website you want to visit. Another name for a web address is the URL, or Uniform Resource Locator.

What is the address bar?

100

refers to using somebody else's hardware over the Internet to do computing tasks. Common uses  include file storage, website hosting, web applications, social media, and gaming services.  

What is Cloud Computing?

100

control the flow of network traffic and protect systems from unauthorized network connections. They are configured with a set of rules that define what kind of traffic is allowed and what kind is not allowed.

What are Firewalls ?

200

AKA CPU... is the brains of the computer where most calculations take place. It is an integrated circuit that processes instructions sent from the operating system and software programs.

What is the Central Processing Unit?

200

respecting the privacy and dignity of other human beings

What is Human Dignity?

200

This button will hide the browser window but keep it running and available on the taskbar at the bottom of the screen.

What is the Minimize (Minimize button)?

200

transmit data in real time as it is created. Some examples are online video calls, traffic cams, and gamer streams.

What is Live Streaming?

200

is when a computer requires someone to prove they are who they say they are. Usernames and passwords are the most common method

What is  Authentication?


300

The main software program that controls computer processing, software application execution, and integration and operation of computer peripherals, devices, and hardware. Examples are  Microsoft Windows 10, Linux, and OS X.

What is the Operating System?

300

protecting confidential data and information.

What is Confidentiality? 

300

 technology that provides wireless Internet connectivity through wireless router. Uses radio waves to transmit data within a particular area referred to as a hotspot.

What is WiFi?

300

Technologies that help people share their lives with other people over the Internet. Generally, the user creates a unique profile with information about themselves. This information can include photographs, biographical information, work and education history, likes and dislikes, political ideology, religion, and much more.

What is Social Media?

300

emails are crafted to appear as though they were sent from a legitimate organization, such as a bank or an ecommerce website. They convince the user to click a link that takes them to a malicious website where they are tricked into providing sensitive information.

What is Phishing?

400

Integrated circuits used to store computer data, user data, and program data during computer processing. There are two general classifications of computer memory: volatile memory and non-volatile memory. Volatile memory is erased whenever power is lost.  

What is Memory or Random Access Memory (RAM)?

400

 a set of rules or standards you adopt that dictate how you act. As you work with computers, you will be required to make moral decisions in a variety of situations with many degrees of complexity.  

What is Code of Ethics?

400

Manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, they  manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

What is Internet Service Provider (ISP)?

400

a personalized message that is automatically included at the bottom of a new email. They often include personal information such as name, job title, and phone number.

What is a Signature?

400

 Microsoft’s anti-malware product that is preinstalled on most new computers with Windows 10.

What is Windows Defender?

500

Special programs that tell the operating system how to communicate with the computer's hardware

What are Drivers?

500

Involves obeying laws that regulate how computers are used. For example, installing key-logger software on your instructor's computer to obtain her password is a violation of the law, which could subject you to prosecution.

What is Legal Compliance?

500

Refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies.

What is the Internet of Things?

500

 someone who deliberately tries to create conflict among users. Expressing your opinion is encouraged on the Internet; however, they are not usually interested in engaging in a healthy dialog. Instead, they seek to cause contention and disrupt the conversation

What is a Troll?

500

algorithms scramble signals to make them unreadable to anyone who doesn't have the correct key to unscramble them. Even if a criminal intercepts an encrypted signal, they won't be able to understand the information.

What is Encryption?