Java Games: Flashcards, matching, concentration, and word search.

CSA 1 & 2 Concentration 1.0-2.0

AB
antivirus softwareSoftware that detects viruses and repairs files.
browser hijackingSoftware that changes your Internet Explorer settings.
closeTo exit the program or file.
cutWhen you remove data from a document.
discrete speechSpeech recognition system that requires the user to pause momentarily between each word.
favoritesWebsites that the user can store and visit by clicking on the name of the site.
firewallsA piece of hardware or software that examines data passing into the computer or network and discards it if it does not meet certain criteria.
home pageThe first page that is opened in the browser.
literal search enginesSearch using Boolean operators to narrow the search of sites. Searches are based on the words that the user enters.
minimizeTo shrink the window down to the taskbar.
netiquetteNetwork etiquette – The do’s and don’ts of online communication.
pasteTo insert cut or copied data into a document.
search enginesSites on the web that are designed to help people find information stored on other sites.
spywareTechnology that gathers information about a computer user without their permission or knowledge.
wireless networkingTechnology that enables two or more computers to communicate without wires.
federal trade commission acta federal law that protects from deceptive trade practices.
pop up blockerThis can be configured to allow or not allow certain sites to pop up windows. This is especially useful for sites where the email may pop up in another window.
application level gatewaysAlso known as Proxy. – Similar to an application gateway, but uses software applications to view the data before it passes through the firewall.
circuit level gatewaysdata is only allowed into the network based on requests that were sent out of the network. The firewall remembers the requests, and matches them with the incoming data.
copyWhen you make a duplicate of data in a document.
dictation modeEnables users to dictate text into a computer application.
ellipsisThree dots (...) that indicate another dialog box will be opened.
bookmarksWebsites that the user can store and visit by clicking on the name of the site.
historyThe listing of websites that the user has been to in the past few days.
identity theftAny instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason.
maximizeTo make the window fill up the entire screen.
natural language search enginesSearches are completed by typing in complete sentences. Searches are based on key words in the sentence.
packet filtering firewallThis firewall compares the incoming data to a list of rules prepared for the destination it is intended for.
plug and playIndicates that the hardware will run as soon as it is plugged into the computer. Most of these are mice, storage devices, and printers.
secure websiteA website that uses data encryption to keep all information protected.
stateful inspectionA packet filter firewall that examines more than just the address and port information.
Computer fraud and abuse acta federal law that covers any
electronic communications privacy acta federal law that makes it unlawful for companies to violate the security of personal information.
identity theftAny instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason.


Teacher
Northridge MS
Charlotte, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities