A | B |
What are some effective Listening Tips? | make eye contact, lean forward and show interest, but DON'T interrupt, multitask while listening or finish other’s sentences for them |
How much of a song can be used under fair use guidelines? | 10%, but not more than 30 seconds |
stands for Internet Service Provider | ISP |
What are the 4 C’s of Communication? | Completeness, Conciseness, Correctness, Clarity |
Copying material word for word and claiming that it is yours is called: | Plagiarism |
HTML _____________. | contains invisible tags that tell the Web browser how a page should be displayed on a monitor. |
examples include Excite, Google, Bing | Search engine |
Good communication requires both expressing information and receiving information. What are 4 skills needed to effectively communicate? | Speaking, Writing, Listening, Observing |
Each Web page has its own _______ which uniquely identifies it. | URL |
contains a feature that allows you to bookmark favorite websites | Browser |
What is the purpose of using emoticons in e-mail messages? | They express the emotional tone of the message |
HTTP stands for ___________. | hypertext transfer protocol |
Which are the general Rights given to copyright owners? | To reproduce, distribute, or make derivatives of the work or perform and display the work publicly |
How much of a video can be used under fair use guidelines? | 10%, but not more than 3 minutes |
The copyright for a work by a single author lasts ____ years after the author’s death. | 70 |
data that has been translated into a secret code for security reasons | Encrypted |
What is Copyright? | The exclusive privilege that allows an author or owner to print, sell, publish, etc. his or her own work. |
The rules of courtesy that we use while on the Internet are referred to as ___________. | Netiquette |
What are the 5 components of the Internet? | Email, Usenet, FTP, Telnet, WWW |
a program error | Bug |
the fact that if humans enter incorrect data into a computer, the computer will generate incorrect results | Garbage-in, garbage out (GIGO) |
the practice of breaking computer security measures designed to prevent unauthorized access to a computer system | Hacking |
the unauthorized copying of a copyrighted computer program | Software Piracy |
data that has been translated back into regular text after being encrypted for security reasons | Decrypted |
contains tags that are used when a browser creates Web pages | HTML |
used to log onto a remote host computer | Telnet |
;-) is an example | Emoticon |
the fastest growing part of the Internet | WWW |
a computer program that acts as a time bomb and can destroy the contents of a hard or floppy disc | Virus |
www.msnbc.com is an example | URL |
allows users to move files from one site to another | FTP |
controlling access to a computer by using means such as fingerprint, voice matching, retinal scanning. | Biometric Security |
a computer program that can prevent the infection of a computer by known viruses | Vaccine |
contains e-mail, Usenet, File Transfer Protocol, Telnet and the World Wide Web | Internet |
Be prepared to identify examples of Sabotage, theft of Service, Property Crimes and Financial Crimes. | Yes, I will be prepared! |