Java Games: Flashcards, matching, concentration, and word search.

Chapter 1 Glossary Terms

Use this activity to help you review for the test.

AB
adwareSoftware that delivers advertising without the user'sk nowledge or consent.
cyber predatorA person who uses the Internet to make contact with others (usually with children and teens) in order to harm them.
digital mediaAny combination of audio, video, images, and text used to convey a message through technology.
encryptionConverting text into an unreadable series of numbers and letters to protect information. Digital encryption uses software that can scramble and unscramble the data.
ergonomicsA science that studies the best way to design a workplace for maximum safety and productivity.
hackerA person who finds an electronic means of gaining unauthorized access to a computer.
keyloggerSoftware that tracks keyboard use and transmits it to be used for illegal purposes.
malwareThe abbreviation for malicious software designed to damage a computer or steal information.
naming conventionA set of rules used in the naming of files and folders.
online backupA means of backing up or storing data using the Internet.
phishingA social engineering activity where the perpetrator uses fake Web sites or emails to trick a user into providing personal information or passwords.
repetitive stress injuryMuscle or joint injury that results from performing actions repeatedly.
rootkitSoftware designed to keep a computer user from knowing the computer system has been infected by malware.
serverA computer designed to store files from multiple computers.
social engineeringTricking users into providing information in the belief that a request is legitimate.
spywareMalware that captures information from a computer without the user?s knowledge or consent.
Trojan horse (also called Trojan)Software that appears to be useful but instead allows access to a computer without the user?s knowledge or consent.
virusA program that infects a computer without the permission or knowledge of the owner. A virus usually attaches itself to executable programs, allowing it to travel to other computers. Viruses require action by the computer user in order to activate them.
wormA form of a virus that does not require any action by the computer user. It spreads by using the email functions of the computer. A worm?s action overwhelms Web servers, often shutting them down.


Media Specialist
Year
NORTH LAUDERDALE, FL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities