Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Science

TermDefinition
Anti-spam program a program that helps detect unwanted ads in emails or otherwise things other people have marked unwanted
Antivirus program program that keeps a computer from being infected with malware or other things that might harms its system
Audit trail a record of the changes that have been made to a file or files
Back door a way of helping to bypass security measures with in a computer
Backup copying or archiving a file in order to recover it anywhere within cyberspace
Biometric device programs used to confirm the identity of someone
Botnet large numbers of computers used to generate scam
Code of conduct way someone should behave while using a computer
Computer addiction when someone spends various time on a computer
Computer crime when illegal things are done through a computer
Computer ethics way decisions are made for how rules are made
Computer forensics practice of collecting, analyzing and reporting on digital data in a way that is legally admissible
Computer security risk event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Computer vision syndrome disruption of the vision when you focus the vision on a monitor for extended periods of time nonstop
Content filtering filters or blocks certain things when searching things up
malware Hostile or invading data that can corrupt systems more commonly a virus
Hyperlink Reference the user can click on for more data or help
RAM An acronym for Random Access Memory
Cyberspace The connection of computer where data goes through
HTML HTML stands for Hyper Text Mark Language
Employability skills non-technical skills, knowledge and understandings that are necessary to gain employment and participate effectively in the workplace
binary Binary is the way that computers reads data based on the binary numeral numbers of 1 and 0
Web browser The application in the computer to look up things via URL in the World Wide Web
cookies They store data and can be used 5o track web sessions within a browser
algorithm procedure or formula for solving a problem
Soft skills term often associated with a person's "EQ" (Emotional Intelligence Quotient),
Hard skills Specific, teachable abilities that can be defined and measured
Hardware and software Hardware is the physical parts of the computer and software is the digital part of it
marginalize To treat as significant
Operating system is system software that manages computer hardware and software resources and provides common services for computer programs
Self-motivation Motivated to do or achieve something because of one's own enthusiasm or interest because you want to
Visual programming language programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually
NETWORKING Connecting or working with a network
Digital ethics the study of how to manage yourself professionally and in a clinically sound manner online and digital medium
Entrepreneur A person who takes the risk to open and manage a business
Blog/Blogging a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
Netiquette the correct or acceptable way of communicating on the Internet.
Phlishing the activity of defrauding an online account holder of financial information by posing as a legitimate company
Created by: bvjh0808