Java Games: Flashcards, matching, concentration, and word search.

Technology Terms: Things I learned about Browsers and the Web.

Many of the terms listed here can be identified after reading this sharebook at, http://www.20thingsilearned.com. Learning these terms that will be helpful throughout this course.

AB
SpamUnsolicited Email sent to sell or advertise
VirusSoftware designed to damage or destroy a computer
SpywareSoftware designed to take over, track, or intercept computer information
httpsan interactive lock, and a seal that identifies a secure site
Hyperlinkclick on this to go to another page or place
HTTPunderlying protocol used by the world wide web
HTMLauthoring language of web pages
URLthe address of a web page. Uniform Resource Locator
RSSreally simple syndication, text files
spamjunk e-mail
spimjunk e-mail in instant messaging
search enginesite that lets you type in a keyword and search the web
cookieinfo about you that allows web pages to be customized to match your interests
chatroomvirtual room where chatting takes place
ethernetcommonly used to connect computers to networks
hacker (good)a computer enthusiast who likes to learn computer systems
hacker (bad)tries to gain unauthorized access to computer systems
flamingwhen a writer attcks another person in harsh and personal terms
pharmingdomain spoofing
phishingan e-mail that falsely claims to be an established enterprise to scam personal info
byteThe smallest measure of storage capability is called a...
Peripheralsscanners and printers
outputDevices that are used to talk to the computer are called...
1 Megabyte =1,000,000 bytes
ROMWhat kind of memory is permanent and contains the instructions for starting up a computer?
RAMWhat kind of memory is temporary and holds the image on the monitor?
SpreadsheetWhich program would you use to create a graph?
Word ProcessingWhich program would you use to create a report?
DatabaseWhich program would you use to create a form letter and send it to a everyone on a mailing list?
Browsera program used to view HTML documents
Computer hardwarekeyboards and monitors
"trolls"members of an online forum who use anonymous/fictitious identities or fraudulently pose as other people, for the sole purpose of spamming the community with inappropriate or irrelevant content/
TCP/IPa set of rules (packets) that allows computers to “talk” to each other and send information back and forth.
bandwidthrate that information flows over the internet.
Cloud Computing, whereby shared resources, software and information are provided to computers and other devices on-demand,
WEB APPS, an application that is accessed over a network
JavaScriptcripting language used to enable programmatic access to objects within both the client application and other applications
AJAX(Asynchronous JavaScript and XML)
PLUG-INSA program that adds a specific feature to a user's browser so it is able to play/view certain files. Examples: Flash, Shockwave
BROWSER EXTENSIONS, Adds new functions to your browser
synchronizationlets you save your browser settings online, in the cloud, so they aren’t lost and can be shared between computers
Malwareis malicious software installed on your machine, usually without your knowledge.
Three Sections of a URL, Scheme/Hostname/Path
IP AddressA set of numbers that identifies a url in order to locate a device.
DNSThis is a service that stores, translates, and retrieves the numerical address equivalents of familiar host names that you use everyday (such as the "www.4teachers.org" in http://www.4teachers.org)
Extended Validation Indicators, gives you the information you need to help ensure that you’re not entrusting your information to a fake website
OPEN SOURCE, of or relating to or being computer software for which the source code is freely available


Instructor
University of Findlay
Findlay, OH

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities