click below
click below
Normal Size Small Size show me how
csa 2
essential standard 7 - digital literacy
Question | Answer |
---|---|
Adware | computer software that displays advertisements |
Application | also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones |
Bias | a personal and sometimes unreasoned judgment or prejudice |
Blog | a website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it |
Bystander | one present but not taking part in a situation or event |
Cell tower | a site containing antennas and other electronic communications equipment, usually in a high place, that makes up a cell in a cellular network |
Central Processing Unit (CPU) | the central processing unit carries out the functions in a computer |
Citation | an act of quoting providing the specific source of the material |
Cloud computing | a computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer; some examples include word processing documents, e‐mail, and music files |
Cookie | a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server |
Copyright | exclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death |
Coverage area | refers to the area in which a service provider offers its communication service |
Credible | offering reason to be believed |
Cyberbullying | using technology to harm others through deliberate, repeated, and hostile attacks |
Data package | what the cell phone company charges for use of the internet of your smartphone |
Database | a computer system that stores enormous amounts of data |
Dead zone | an area where a cell phone does not receive a signal |
Digital addiction | a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers |
Digital security certificate | a certificate given to websites that verifies whether a website is secure or not |
Domain name | a type of internet address such as .gov for government, .edu for educational institutions, .com for commercial sites, etc. |
Downloading | receiving data, such as a music or video file, from a server or another computer system |
E‐mail | electronic mail sent between computer networks |
Emoticon | the use of letters and punctuation in a message that indicates the emotion of the text (e.g., :) to mean happy) |
E‐reader | a device or computer program used for reading electronic books |
Fair use | a limitation and exception to the exclusive right granted by copyright law to the author of a creative work |
Hacked | getting hacked means that your computer or computer network has been broken into without your permission |
Hard disk drive | a computer device that reads, writes, and stores digital data |
Hardware | the physical parts of a computer |
Hosting service | a service, such as web hosting, that is usually operated by a company in order to provide access to the Internet through servers |
HTTP | a protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL and is indicated by "http://" |
HTTPS | group of rules and functions that is used to transfer data over the World Wide Web and is secure; it is used for websites that handle sensitive information that would require greater security, such as payments and bank account information |
Identity theft | a form of fraud where one person assumes the identity of another person |
Intellectual property | property created from an original thought or idea |
Interference | refers to any disruption or alteration of a signal in cell phones Internet |
IP address | a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL |
Location‐based service | a service provided through cell phone networks and accessed by cell phones which uses location to provide information on various places like restaurants, offices, museums, schools, etc. |
Malware | computer software designed to harm a computer |
Memory | any data or information in a computer; it is commonly used to refer to read‐access memory (RAM) which is temporary and used to operate software; at times, it can also refer the amount of disk space available on a computer |
MMS | an abbreviation for multimedia messaging service, which allows for sending video, audio, pictures, ringtones, and any other media through a cell phone |
Moore’s Law | suggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making computer speeds increase exponentially; this law is related to other trends in digital technology |
MP3 | a common audio format for playback and storage of music on digital audio players |
Multimedia | content and media that combines different content forms, such as text, audio, animation, and still images |
Open source | a way in which software is developed that allows access to the source code of an application or software and is free to update and use |
Operating system | a group of software programs that provide instructions to a computer so that it may operate |
Piracy | the unauthorized reproduction or copying of music, video, or literature without proper compensation or permission |
Plagiarism | representing the language or thoughts of an author as your own, without indicating where the information is from |
Plug‐in | something you can add to a software application to enhance its abilities |
Presentation | a computer program used to display information, normally in the form of a slide show |
Processor | another term for the CPU of a computer—the central processing unit that runs computer programs |
Programming | the process of designing, writing, testing, debugging, and maintaining the source code of computer programs |
QR code | Quick Response code; a type of two‐dimensional bar code, consisting of black modules in a square pattern on a white background, that can hold a large amount of any kind of data |
RAM | computer memory that is temporarily used to allow programs to operate, which would be quicker than if they accessed ROM |
Roaming | the extension of service or coverage in a wireless telecommunications system |
Search engine | a computer program that locates information on the web |
Server | a computer or series of computers that link other computers together and often store important information |
Server farm | a cluster of computer servers used when there is the need for large server capacity and capability |
Service Provider | a company or organization that offers a service, such as web, cable television, or phone access |
Sexting | the act of sending inappropriate sexual material, usually text or images, between cell phones |
Signal strength | refers to the strength of a connection over a wireless (radio) telecommunication system |
Smartphone | a cell phone that is designed to perform various computer applications including, but not limited to email, browsing the web, playing video games, playing music, and watching videos |
SMS | also known as short message service; it is a text messaging service for cell phones |
Social media | media that use Internet and cell phone applications to interact, collaborate, and create content |
Social network | a website designed for groups of people who publish their own information and share it with others such as friends, family, co‐workers, etc. |
Software | a group of computer programs that give instructions to a computer so that it functions |
Spam | e‐mail that’s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses |
Spreadsheet | a computer application that simulates a paper accounting worksheet |
Spyware | a type of malware that unknowingly collects information from a computer |
SSL | an abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet |
STEM | refers to careers in science, technology, engineering, and mathematics |
Tablet | a highly portable computer shaped like slate or pad of paper, featuring a touch screen |
Template | a standard display design used in blogs to provide a structure for information to be viewed |
Textspeak | abbreviations and slang commonly used to shorten a text or instant message, like using "?s" for "questions" |
Uploading | sending data, such as a music or video file, from a local computer system to another computer system or server |
URL | the address of a website |
Viral | an object or pattern that is quickly replicated and shared |
Virus | a type of malware that replicates itself and spreads to other computers |
Web 2.0 | refers to applications on the web that allow users to interact through user‐generated content, design, and collaboration; includes the functions of social media websites |
Web browser | software that allows for navigating the web; it is different from a search engine in that it provides a window in which to search, but does not search itself |
Webcam | a video camera for computers typically used to provide real‐time video footage |
Wi‐Fi | networking technology that allows computer devices such as personal computers, laptops, and cell phones to communicate over a wireless signal |
Wiki | a website that allows users to add and edit interlinking web pages |
Word processing | a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material |
WWW | called "World Wide Web" or simply, "the web," it is a portion of the Internet that can be used through a web browser |