Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.

By signing up, I agree to StudyStack's Terms of Service and Privacy Policy.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Demo 1

Adware A type of malware that serves banner ads or pop-up ads to you while in use. Frequently installed without user's knowledge.
Cascading Style Sheets A technique used to format text and layout of a web page.
Clicker A small, handheld device that allow students to respond to questions asked verbally, on paper or on screen and enables you to instantly assess their comprehension of your lessons.
Document Object Model A representation of the structure of the objects used in a web page.
Ethernet The dominant cabling and low level data delivery protocol used in local area network.delivery protocol used in local area network.
Ethernet patch cable A twisted pair high signal integrity cable type often referred to as Cat5 (Category 5)
Hardware Computer equipment.
Hyper-Text Markup Language (HTML) The most common web page format.
Hyper-Text Transfer Protocol (HTTP 1.1) Used to transmit web pages.
IEEE 802.11b/g An industry standard that describes how data is transmitted wirelessly.
Instant Messages (IM) A type of real time communication service made possible through an internet connection and an IM software client. It is somewhat like email, but much more like a chat room.
Internet A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission.
Internet 2 A next-generation IP and optical network that delivers production network services to meet the high-performance demands of research and education, and provides a secure network testing and research environment.
IT Information Technology
JavaScript A script language commonly used to provide interactivity on a web page.
Mbps Mega baud per second is a rate of data speed
modem A device used to connect to a network through a land line.
Network adaptor A device in your computer that can connect to the network.
RIAA Recording Industry Association of America
Social networks Online communities where people meet, socialize, exchange digital files, etc.
Software Programs that run on a computer.
Spyware (Malware) is software that covertly installs itself on your computer, and then performs secret operations without your permission.
Secured Socket Layers Used to provide higher levels of data protection.
Text Messages A type of real time communication service made possible through a cell phone data plan. Unlike IM, these messages are received on a cell phone.
Trojan Fool users into installing on their machine (usually through an infected email or pop up window), and then function as independent programs that operate secretly.
Virus An umbrella term used to describe malicious programs that unwantedly install themselves onto your computer.
VPN A form of communication over networks that are public in ownership, but emulate a private network in terms of security.
Worm Malware that robotically sneak into your email, and begin broadcasting copies of themselves without permission. Because they do not require user intervention to reproduce, worms reproduce at an alarming rate.
Created by: Winonadeb