Busy. Please wait.
Log in using Clever

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't know
Remaining cards (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Science

Anti-spam program a program that helps detect unwanted ads in emails or otherwise things other people have marked unwanted
Antivirus program program that keeps a computer from being infected with malware or other things that might harms its system
Audit trail a record of the changes that have been made to a file or files
Back door a way of helping to bypass security measures with in a computer
Backup copying or archiving a file in order to recover it anywhere within cyberspace
Biometric device programs used to confirm the identity of someone
Botnet large numbers of computers used to generate scam
Code of conduct way someone should behave while using a computer
Computer addiction when someone spends various time on a computer
Computer crime when illegal things are done through a computer
Computer ethics way decisions are made for how rules are made
Computer forensics practice of collecting, analyzing and reporting on digital data in a way that is legally admissible
Computer security risk event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Computer vision syndrome disruption of the vision when you focus the vision on a monitor for extended periods of time nonstop
Content filtering filters or blocks certain things when searching things up
malware Hostile or invading data that can corrupt systems more commonly a virus
Hyperlink Reference the user can click on for more data or help
RAM An acronym for Random Access Memory
Cyberspace The connection of computer where data goes through
HTML HTML stands for Hyper Text Mark Language
Employability skills non-technical skills, knowledge and understandings that are necessary to gain employment and participate effectively in the workplace
binary Binary is the way that computers reads data based on the binary numeral numbers of 1 and 0
Web browser The application in the computer to look up things via URL in the World Wide Web
cookies They store data and can be used 5o track web sessions within a browser
algorithm procedure or formula for solving a problem
Soft skills term often associated with a person's "EQ" (Emotional Intelligence Quotient),
Hard skills Specific, teachable abilities that can be defined and measured
Hardware and software Hardware is the physical parts of the computer and software is the digital part of it
marginalize To treat as significant
Operating system is system software that manages computer hardware and software resources and provides common services for computer programs
Self-motivation Motivated to do or achieve something because of one's own enthusiasm or interest because you want to
Visual programming language programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually
NETWORKING Connecting or working with a network
Digital ethics the study of how to manage yourself professionally and in a clinically sound manner online and digital medium
Entrepreneur A person who takes the risk to open and manage a business
Blog/Blogging a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
Netiquette the correct or acceptable way of communicating on the Internet.
Phlishing the activity of defrauding an online account holder of financial information by posing as a legitimate company
Created by: bvjh0808



Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards