Java Games: Flashcards, matching, concentration, and word search.

Understanding Computer Systems

Find the words in the word find

AB
InternetCollection world-wide networked computer files connected by use of telecommunication devices..
IntranetCollection of networked computer files created by a company or an organization to share information.
WebsiteCollection of related and linked web pages.
Browsera program that allows users to view web pages and online information
Internet ExplorerMicrosoft Internet page viewer
Networka bunch of computer connected together that share information
Windows ExplorerNavigation for local drive and neetwork drives
SatelliteTelecommunication device that sends data by bouncing signals
ModemHardware device that allows a electric data to be sent by telephone and cable service lines
FirewallA security system designed to prevent unauthorized entry to a network.
Uniform Resource LocatorNaming system that allows web visitors to locate the exact resource they are looking for.
IP addressNumber address for web pages on the Internet.
Domain name systemConverts the names people relate web addresses into IP addresses that computers work with.
ProtocolLanguage the computers uses to "speak" to one another on a network.
SynergyThe effect that a group effort can create.
LANA collection of computers on a network in the same geographical area.
Peer-to-Peer NetworkAll the workstations are equal & connected to each other through a network cable or a wireless signal.
Client/Server NetworkManaged & secured by a network operating system.
WANA network that allows people to communicate, share information, & work together even if they are miles apart.
RoutersNetwork devices or programs that choose the best pathway for each packet.
AnonymityThe ability to keep oneself out of the public spotlight.
CookieA small file saved to your hard drive when you visit a Web site. It stores information about you so it is available when you return.
GUIDA unique identification number that is generated by a piece of hardware or by program.
InfringmentBreaking a copyright law by pretending that another person's work is yours.
SpoofingA false Internet Protocol or e-mail address used by intruders to gain access to a network
PhishingA special kind of scam used by criminals to try to get your personal information.
Trap DoorA secret way into the system.
PiracyIllegal copies of programs.
VandalismPrank material used by criminals on an unprotected Web server.
Antivirus ProgramsPrograms used to protect computers from viruses.
Full BackupCopy everything stored on your computer.
PacketsInformation divided into tiny segments.


Business Teacher
Maya Angelou HS
TX

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities