Java Games: Flashcards, matching, concentration, and word search.

Study Guide Activities for Ethics and Computer Components Quiz

Study helps for quiz.

AB
PeripheralAny device that can be attached (added on) to a computer
CopyrightThe legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.
PhishingThe act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
FirewallDesigned to protect against Network Intrusion
A random mix of letters and numbersThe safest way to create a password
Worm virusA destructive program that replicates itself over a computer network.
Trojan Horse virusA destructive program that masquerades as something it is not.
SPAMElectronic junk mail or junk newsgroup postings.
.jpegfile extension is for a picture file
.wavfile extension for an audio file
LANA group of computers, connected by cables, set up to communicate with one another. Local Area Network
Random Access MemoryTemporary
CPUThe "brains" of the computer
IPOS cycleInput, Processing, Output and Storage
Public DomainSoftware that is given away without a charge
HackerA person who secretly gains access to your computer or files without your permission
a site licenseAllows you to legally install software on multiple computers in your school or building
10 percent or 3 minutesthe amount of copyrighted motion media can you use in a presentation
sharewaremake a financial donation and register as an offical user
Computer crimecriminal act is committed through the use of a computer
VirusA program that is written to cause corruption of data on a computer


Holmes Middle School
Eden, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities