Java Games: Flashcards, matching, concentration, and word search.

Ch 29 Vocabulary

AB
Black hatBad hacker who creates malicious programs to break into computers and do harm.
Carpal Tunnel SyndromeCommon repetitive motion disorder that effects the nerves of the wrist and can make normal computer use impossible.
Data lossInevitable result of continued use of a computer where files or other data is corrupted and lost.
ErgonomicsUse of scientific information about the human body to design healthier work environments
Eye strainProblems caused when computer users stare at a computer screen with a bright light source directly behind it; can cause serious eye damage.
FirewallHardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network
HackerSkilled computer programmers who make applications do something the original programmer did not intend.
Overloaded outletSituation where too many things are plugged into an outlet; creates a fire hazard
PhishingE-mail attack or scam designed to gather information from a user while appearing to be safe
Repetitive motion disorder (RMD)Muscular disorders that come from repeated motions like typingand can cause a great deal of pain and disability.
Security patchAddition to an operating system or application that plugs a security hole in the software's code.
SpoofingWhen someone presents themselves as someone else in order to trick a user, either through e-mail or a bogus Web site
SpywareMalicious program installed without the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information
Strong passwordPassword with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
VirusProgram specifically written to cause harm to your data and operating system
Weak passwordPassword that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters
WormMalicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload computers and networks.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities