Welcome to StudyStack, where users create FlashCards and share them with others. Click on the large flashcard to flip it over. Then click the green, red, or yellow box to move the current card to that box. Below the flashcards are blue buttons for other activities that you can try to study the same information.
Test Android StudyStack App
Please help StudyStack get a grant! Vote here.
or...
Reset Password Free Sign Up

Free flashcards for serious fun studying. Create your own or use sets shared by other students and teachers.


incorrect cards (0)
correct cards (0)
remaining cards (0)
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the Correct box, the DOWN ARROW key to move the card to the Incorrect box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

Correct box contains:
Time elapsed:
Retries:
restart all cards


Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Demo 1

QuestionAnswer
Adware A type of malware that serves banner ads or pop-up ads to you while in use. Frequently installed without user's knowledge.
Cascading Style Sheets A technique used to format text and layout of a web page.
Clicker A small, handheld device that allow students to respond to questions asked verbally, on paper or on screen and enables you to instantly assess their comprehension of your lessons.
Document Object Model A representation of the structure of the objects used in a web page.
Ethernet The dominant cabling and low level data delivery protocol used in local area network.delivery protocol used in local area network.
Ethernet patch cable A twisted pair high signal integrity cable type often referred to as Cat5 (Category 5)
Hardware Computer equipment.
Hyper-Text Markup Language (HTML) The most common web page format.
Hyper-Text Transfer Protocol (HTTP 1.1) Used to transmit web pages.
IEEE 802.11b/g An industry standard that describes how data is transmitted wirelessly.
Instant Messages (IM) A type of real time communication service made possible through an internet connection and an IM software client. It is somewhat like email, but much more like a chat room.
Internet A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission.
Internet 2 A next-generation IP and optical network that delivers production network services to meet the high-performance demands of research and education, and provides a secure network testing and research environment.
IT Information Technology
JavaScript A script language commonly used to provide interactivity on a web page.
Mbps Mega baud per second is a rate of data speed
modem A device used to connect to a network through a land line.
Network adaptor A device in your computer that can connect to the network.
RIAA Recording Industry Association of America
Social networks Online communities where people meet, socialize, exchange digital files, etc.
Software Programs that run on a computer.
Spyware (Malware) is software that covertly installs itself on your computer, and then performs secret operations without your permission.
Secured Socket Layers Used to provide higher levels of data protection.
Text Messages A type of real time communication service made possible through a cell phone data plan. Unlike IM, these messages are received on a cell phone.
Trojan Fool users into installing on their machine (usually through an infected email or pop up window), and then function as independent programs that operate secretly.
Virus An umbrella term used to describe malicious programs that unwantedly install themselves onto your computer.
VPN A form of communication over networks that are public in ownership, but emulate a private network in terms of security.
Worm Malware that robotically sneak into your email, and begin broadcasting copies of themselves without permission. Because they do not require user intervention to reproduce, worms reproduce at an alarming rate.
Created by: Debbie Trotter Brown Debbie Trotter Brown on 2009-07-22



bad sites Copyright ©2001-2014  StudyStack LLC   All rights reserved.