Java Games: Flashcards, matching, concentration, and word search.

Final Exam Study Flashcards 2016

AB
TermDefinition
Cyberbullying definitionIs the use of technology to harass, bully, threaten or intimidate others
Cyberharrassmentanonymously using a device with the purpose of harassing or threatening the victim. It also includes relaying sexually suggestive messages after the victim has requested the caller to stop such communications.
Cyberstalkingwhen a person causes serious mental distress to another or causes the person to believe they are in danger of serious harm, through the use of a computer.
Cybertheft/fraudNo one can assume an assumed identity to fraudulently purchase items or sign up for services; You cannot deceitfully sell goods knowingly selling something different than advertised
DO First: DDon't Retaliate
DO First: FFigure out who it is
DO First: IIgnore
DO First: OOff your buddy list/unfriend/unfollow/block user
DO First: RRespond after thinking
DO First: SSave Evidence
DO First: TTell an adult for help
If you feel you are being cyberbullied you shouldDO FIRST
Jessica Logan Actrequires school districts to establish cyber-bullying policies and to annually teach teachers and inform parents about their overall bullying policies. It also requires them to teach students about the policies if state or federal funding is provided for that purpose.
Jessica Logan Who Was SheShe was an Ohio teen whose sext picture was shared with everyone at multiple schools who ended up committing suicide because of the constant humilitation and cyberbullying
Ohio Cyberbullying LawsOhio has 4 laws related to cyberbullying:
Types of Cyberbullies: 4. Inadvertent Cyberbullydoesn’t know they are being a cyberbully; they don’t know how to react appropriately tosends out electronic communication without understanding how and why others can take it the wrong way (they think they are being funny, joking, sarcastic, but since no body language online the receiver of communication takes the communication in a way that feels like they are being cyberbullied)
Types of Cyberbullies: 2. Revenge of the Nerds Cyberbullyneed an audience; want to exert their power/authority/intelligence over other people; have often been a victim of bullying (non-cyber); typically works in secret; rarely sees the seriousness of his/her actions ; most dangerous of all cyberbullies
Types of Cyberbullies: 3. Mean Girls Cyberbullyego-based and most immature of all cyberbullies; typically female cyberbullies but can be boys; victims usually girls but sometimes boys; Like the movie Mean Girls
Types of Cyberbullies: 1. Vengeful Angel Cyberbullydoesn’t see themselves as a bully; right wrong; protecting themselves or others from a bully ; the become a cyberbully themselves! Similar to BATMAN
Types of Technology Used in CyberbullyingCell phones (voice or text), Iming, Postings on websites, Postings on social network sites, private messages to social network sites, Email….
Ways to prevent from becoming a CyberbullyUse good netiquette; unplug once in a while; don’t post anything about anyone that you wouldn’t want posted about yourself; don't post pics of others without asking for permission first; talk out issues with a friend or adult first before lashing out with your computer/cell phone
Ways to prevent from being a VICTIM to cyberbullyingdon’t believe everything you read online; be nice to people in the “real” worldnever open messages from people you don’t know; trust your instincts; unplug once in a while; don't share your passwords with anyone else
Input Devicessends info from the user to CPU (mouse, keyboard, microphones)
CPU  central processing unit; Brains of the computer
Output Devices  sends info from the CPU to user (printer, monitor, speakers)
Binary Codethe basics of all computers; 1 = on/true; 0 = off/false
speed of calculations1 hundred million calculations per second for average computer
supercomputers speed of calculationstrillions/quadrillions of calculations per second
Supercomputers are:  series of big computers "chained together" to work as 1
Charles Babbage  "father" of computers; had the idea for computers in the 1830's
The Analytical Machine  design for computer by Charles Babbage but never built due to lack of money and design issues
Herman Hollerith  MIT Professor who created the Hollerith Census Tabulator
Hollerith Census Tabulator  made for 1890 census to speed up process of counting census cards; done in 6 weeks vs 10 years; punch card computer system
Colossus Computer  first electronic digital computer made in World War II to break German Enigma machine codes
ENIAC  built in 1943-45; electronic general purpose computer to solve many different problems
ENIAC Specifications100 feet long, 30 tons, and 18,000 vacuum tubes
Univac stands forUniversal Atomatic Computer
Univac wasfirst mainframe computer commercially sold and mass produced; size of a typical classroom
IBM, who started itstarted with Hollerith Census Tabulator and went on to build mainframes through 1960's
NASA needed Computer Guidance Systemsince pencils/paper & slide rules couldn't be used in space
NASA's computer  needed to be smaller than mainframe to fit on space craft and included integrated circuits
Integrated circuits  invented in 1959, consisted of a network of silcon on a single chip which had multiple transistors on it
Transistors  invented by Bell Labs and replaced vacuum tubes, made of silicon and tiny wires; perform binary functions in computers
3 things that made smaller computers possibletransitors, integrated circuits and microprocessors
microprocessordeveloped by Intel; was a combination of multiple integrated circuits including a processor (tiny computer); the brains of the computer
Xerox  made ALTO computer in 1973
ALTO Computer  first microcomputer with GUI, mouse, built-in networking and laser printer for $18,000
GUI  Graphic User Interface; ability to use mouse to click on items and get a drop down menu
Apple Computer startedfounded by Steve Jobs & Steve Wozniak in 1976
Apple II computer  first plug & play computer marketed for home users
Apple's Macintosh Computerfirst Apple computer/home computer to have GUI and mouse
Altairfirst microcomputer; non-programmed, no monitor, no keyboard, no GUI
PC  personal computer; name of IBM's first home computer; also the general name of all Intel based computers (non-Mac's)
Microsoftsoftware company started by Bill Gates
PC-DOS  Microsoft's first OS licensed to PC computers (Apple didn't want it) which made all computers except Apple compatible
Windows Operating SystemMicrosoft's first GUI-mouse based OS; inspired by Apple's operating system
OSoperating system; examples Windows 7, Apple OS, Linux
WWWworld wide web; aka The Internet; widely available in the mid-1990's
Herman Hollerith LegacyHerman Hollerith's company eventually would become IBM, one of the biggest computer companies in the world
PacketSmall bundle of information that you are requesting or sending on the internet
RouterSorts the packets into the right direction (sort of precise); to the correct part of the subnet you are on, 
ProxyThe Middleman; 1st security stop to make sure you are not trying to get to inappropriate sites (only used on some networks including schools and corporations; not usually on home networks)
Ping of DeathAlso known as viruses, spyware, phishers, spam, denial-of-service attacks…
Firewall2nd security stop; checks for specific type of information you are sharing as you leave the network Checking packets for suspicious items within the packet (viruses, spyware…) like a customs agent or security stop at the airport
Web ServerFinal destination of packet where it is unpacked and loaded to web browser
RAMRandom Access Memory; The Short Term Memory on your computer; the more RAM the more things you can do on your computer at one time,
Hard Drive (HDD)Long Term Storage on your computer which has moving parts inside,
Motherboardhe main component inside the case. It is a large rectangular board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives(CD, DVD, hard disk, or any others) as well as any peripherals connected via cords,
Optical drivesa CD, DVD or Blu-Ray disc drive that is internally or externally connected to the computer,
PeripheralsAny device that connects to a computer but is not part of the computer itself
Examples of peripheralsPrinters Speakers Mice headphones scanners
CPUCentral Processing Unit performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer,
Removable Mediastorage media that can be connected to the computer temporarily like USB pens/flash drives, external hard drives, SD cards...,
Fixed Mediastorage media that is part of the computer, such as a hard drive which have spinning disks, aka Hard Disk Drives (HDD) or Solid State Drives (SSD)
SSDSolid State Drives; which have no moving parts inside are are faster and more efficient but more expensive,
Storage Mediawhere files and documents are saved on the computer most computers will have a hard drive or flash memory storage device; some storage devices are fixed while some are removable
Power Supplypowers the computer from the electrical outlet or battery,
Casethe plastic or metal enclosure that covers all of the components of the computer,
Processors (or Microprocessors or CPU)brains of the computer that does all of the calculating; Intel & AMD biggest manufacturers of processors
Most important components when buying a computermore money for high quality CPU and RAM at purchase = longer lifespan of computer
Microsoft  software company that created Windows OS, Office (Word, Excel, Power Point) and MS-DOS
Founders of MicrosoftBill Gates & Paul Allen, 
Bill Gates  founder of Microsoft with "gambling" personality, impulsive but smart, possibly ADHD
Steve Ballmer  previous CEO of Microsoft; college friend of Bill Gates
Harvard Universityschool attended by Bill Gates (he didn't graduate) and Steve Ballmer (he did graduate)
Microsoft's first tech innovationwrote BASIC programming language for MITS/Altair computer
MITS/Altair  first microcomputer (aka Personal Computer aka PC)
How Microsoft makes their moneyby licensing software to individual computers (not selling the copyright of software to a company)
MS-DOS  software owned by Microsoft that they bought from Seattle Computer Company
GUIGraphic User Interface
Reunion of Microsoft & Applein 1997 Microsoft invested $150 million dollars into apple, becoming a major stockholder
Apple  computer company create by Steve Jobs and Steve Wozniak
Steve Jobs  founder of Apple, experimental personality (drugs, religions, therapies...), charming but didn't treat people nicely
Evil Geniusnickname of Steve Jobs,
Steve "Woz" Wozniak  co-founder of Apple Computers; was the original inventor of computers for Apple
Apple's first tech innovationused "Blue Box" to steal long distance telephone service from AT&T; idea came from hacker called Captain Crunch
IBM  makers of main frame computers (in 70's and 80's) who Steve Jobs compared to Big Brother
HP  turned down opportunity to create Woz's first computer The Apple I in 1976
Apple II  personal computer with CPU, keyboard, color graphics and floppy disk; launched personal computer industry
The Lisa  First computer using GUI and mouse sold to the public
Xerox  originally created the idea of GUI and the mouse; both Apple and Microsoft "pirated" the idea of Xerox
The Macintosh  Rival of The Lisa, and the subject of the infamous 1984 Apple Super Bowl Commercial
Steve Jobs Fired from Applein 1985 due to conflicts with CEO Jack Sculley and the Board of Directors
Pixar Animation Studios  a company that Steve Jobs bought that was later bought by Disney
Reunion at AppleSteve Jobs rehired as CEO of Apple in 1997; revitalized Apple with products such as iPod, MacAir, MacBook, iTunes, iPhone and iPad
Apple I  first computer that Woz and Steve Jobs made as Apple Computers; made of wood
Yahoo  founded by Jerry Yang & David Filo at Stanford University in 1994,
How Yahoo workedit is a web directory
search engineA program for the retrieval of data, files, or documents from the Internet.
Examples of search enginesYahoo, Google, Excite, Lycos, Dogpile....
Yahoo started:as a way to collect websites to win a fantasy basketball league
how Yahoo makes moneyused banner ads on Yahoo pages to generate revenue/income
web directoryHuman manual catalogging of websites by subject, often providing brief descriptions of each website’s content
Excite  started in 1994 at Stanford University
How Excite workedused web crawlers to find search results automatically without human interaction
How Excite made moneyused banner ads on Excite pages to generate revenue/income
web crawlersa computer program that browses the World Wide Web in a methodical, automated manner and reports back back to a search engine with results
Google  founded by Sergey Brin and Larry Page at Stanford University in 1998, 
How Google Worksuses a web crawler to find websites and count the number of in-links for search results with higher results listed higher on the search list
"In-Links"when a website is listed by other websites
Google's namenamed GOOGLE after the mathematical term googol which means 1 followed by 100 zeros or 1 to the 100th power,
Google's company motto“Don’t be evil”, 
To Googlemeans searching for something on the Internet
How Google made moneypurposely did not use banner ads to generate income but “pirated” the idea of sponsored links to generate income
Adwordsusing keywords typed in a search to generate related sponsored ad’s in a search query, 
operating systemthe "master" software program on a computer that allows all other functions and software to work
Examples of Operating SystemsApple OS, Windows 7, Windows XP, Windows Vista, Linux, Unix, MS-DOS, Android...
BLOGonline opinion of any topic in 2-10 paragraph format. anyone can create a blog
WIKIdefinition by collaboration website that has a collection of definitions made by a large group of people the idea is that the more people who contribute towards a definition, the better the definition will be like peer editing with a much larger group of editors
MICROBLOGshort and concise blogs usually under 140 characters status updates/twitter updates 2-3 sentences at most
PodcastA podcast, or non-streamed webcast, is a series of digital media files, either audio or video, that are released episodically and often downloaded through an RSS feed.
Stream:List of updates in some sort of chronological or reverse chronological order
Avatar:Your online persona which is a combination of your image or user name on a social network
ChatOne-to-one communication aka private messaging
Hashtag #Used to annotate a message on a social network Allow a backchannel to be created with posts with the same hashtag
FriendsPeople you are connected with on a social network
Memea thought, idea, joke, or concept to be shared online. It is typically an image with text above and below it, but can also come in video and link form
Crowd SourcingWhen many people are working together online to complete a single tasks
Cloud Computingwhen users access data remotely across an internet connection, rather than through working from a desktop
TweetA microblog made on Twitter
Retweetwhen someone on Twitter sees your message and decides to re-share it with his/her followers
FollowFollowing someone’s online activity i.e. Twitter
Tagskeywords attached to any blog post, image or video to help users search topics or media.
Tag Cloud/Word CloudA tag cloud is a visual depiction of user-generated tags, or simply the word content of a site, typically used to describe the content of web sites.
Dooceda slang term for someone who is fired from their job because of controversial content they published online.
Social MediaInternet-based applications that allow the creation and exchange of user-generated content
Social NetworksServices that allow you to connect with other people of similar interests and background. Usually they consist of a profile, various ways to interact with other users, ability to setup groups, etc. (Facebook)
Social BookmarkingServices that allow you to save, organize and manage links to various websites and resources around the internet. Most allow you to “tag” your links to make them easy to search and share. (Delicious and Diigo)
Social Newssocial news website features user-posted stories that are ranked based on popularity. Users can comment on these posts, and these comments may also be ranked (Slashdot, Digg, or Reddit)
Media SharingServices that allow you to upload and share various media such as pictures and video. Can also allow collaborative game play and file creation (Flickr, Youtube, Aviary, Minecraft, Steam,…)
Microblogging Blogging & Wikisservices that allow you to send opinion based updates sometimes based on facts out to subscribers (Blogs & Microblogs) or to collaboratively edit information (Wikis)
Comments Reviews & ForumsOnline forums allow members to hold conversations by posting messages. (Amazon, Blogger, Wikispaces, Amazon, Yelp, Edmunds.,…) Some services happen in real-time to allow conversations with members around a shared interest (GetGlued)
SixDegrees.comfirst social network started in 1997
Friendster2nd big social network for adults in 2002
MySpacebecame popular in 2004 when teens started using it to follow bands & musicians
Facebookbegan in early 2004 as a Harvard-only network. Beginning in September 2005, Facebook expanded to include high school students, professionals inside corporate networks, and, eventually, everyone.
Anti-virus softwareprogram that checks your computer for viruses
Avoiding Phishing Scamsdon't click on links in suspicious looking emails and avoid giving info a company would already have
Captcha/Recapchaa test to see if you are a human or computer who is signing up for a new email account
Cleaning Trojan viruses off of computershard to clean; usually need to erase hard drive and re-image your computer
Computer Virusesa computer program that is installed without your knowledge usually with harmful consequences
Cookiesa temporary internet file dropped to your computer to make return visit to site more personalized
Dangers of computer virusesslows down computer, corrupts files, erases software...
Do Mac/Apple computers get computer viruses?Yes they do.
DoS AttackDenial of Service Attack
Effects of Trojan Virusescorrupt files, erase date, turn your computer into a "Zombie" computer for someone else to control
Examples of personal information:age, gender, opinions, pets, likes & dislikes
Examples of private information:full name, email, phone number, social security number...
examples of repetitive strain injuriesEye strain, Carpal tunnel syndrome,Wii-itis, Tech Neck
How do you get spywarehidden in regular file downloads like games, movies, videos from untrusted sources
How to stop SPAMno way to totally stop it if you have an email address
Identity Theftoccurs when someone uses your private information without your permission to commit fraud or other crimes
If you meet a cyber friend in real life:1)tell an adult, 2)take a friend, 3)Meet in a public place with cameras
Offline Identityreal life
Online Identityhow you present yourself online including avatars, posts, and content
Personal informationinformation about yourself that is always okay to share with someone online
Personal Safety with Mobile DevicesTurn off GPS tagging on social media because some people may use that to find you in the real world
Phishingsending an e-mail falsely claiming to be a business to scam the user into surrendering private information that will be used for identity theft
Private Informationinformation about yourself that you should never share with anyone; share as Need to Know basis only (forms, applications….)
Repetitive Strain Injuriesinjuries from doing the same type of activity over time which wears out specific parts of your body
Reverse phone NumberWeb services that allow you to enter a phone number to find out where someone lives either for free or for very little money
Self-replicating computer viruscan make a copy of itself over and over again; hard to get rid of
SPAMUnwanted junk emails
SPIMUnwanted junk instant messages
SPITUnwanted junk via internet telephony (aka video chatting/ VoIP phone over internet services)
SpywareAny software that covertly gathers user information through the user's Internet connection without his or her knowledge
Spyware can lead tosystem crashes and general system instability as well as identity theft
Spyware have the ability tomonitor keystrokes and scan files, snoop other applications on your device
Steps to a Strong Password8 or more characters, letters, numbers, symbols, upper and lower case, no private info, no obvious or repeated sequences
Taking care of your body and well-being with Technologytake breaks often, talk to the real human beings
Tech Necklook down at devices over time can lead to chronic neck/spine pain
To effectively use anti-virus program you must allow the antivirus software to1) update itself, 2) update virus definition files to protect against newest viruses at least once a week and 3)to scan your computer for viruses at least once a week
Trojans or Trojan Horsea file that pretends to be one thing but tricks user into installing the virus on the computer
Why do people send SPAM SPIM and SPIT?because they make money off of it with very little effort
Why do we have to worry about Technology Safety?We all end up paying higher prices for goods and services because money lost to online theft and fraud.
why you don't share your phone number with people you don't knowreverse phone number look up!
Will a virus will damage your hard drive or motherboard?No, only the software typically
Wormstype of viruses that spreads without human action (self-replicating)
DoS Definitioncausing so much internet traffic purposely cause a website to go down
#1 rule for using any device cameraYOU MUST WEAR CLOTHES [yes I am yelling!]


Upper School Director of Technology
Lawrence School
Sagamore Hills, OH

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities