Busy. Please wait.
Log in with Clever

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever

Username is available taken
show password

Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't know
Remaining cards (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Digital Citizenship

Bully Someone who acts in an aggressive, hostile, or hurtful manner toward others. Perpetrator is another word for bully.
Bystander People who witness the actions of the bully and the reactions of the victim(s), without taking action.
Grooming Techniques used by predators to try to gain your trust; this could be against children, older people or others.
Netiquette Courtesy, honetsy, and polite behavior practiced on the Internet - key component of digital citizenship!
Upstander Someone who takes action to stop bullying or other inappropriate behaviors.
Anti-virus software Software blocking malicious programs, such as viruses or malware, from harming your computer. This software has to be kept up to date so that the latest threatening programs are guarded against.
Digital footprint All of the information online about a person either posted by that person either posted by that person or others, intentionally or unintentionally.
Encryption The process of converting information or data into a code, especially to prevent unauthorized access.
Firewall Hardware or software that blocks or filters certain types of network traffic from reaching your computer.
Identity Theft A crime that happens when someone gets the person information of another person, usually to impersonate that person electronically for the purpose of stealing money.
Malware Stands for malicious software or code, which includes any harmful code - trojans, worms, spyware, adware, etc. - that is designed to damage the computer or collect information.
Certifications Non-degree awards made to those who have achieved qualifications specified by a certifying authority.
Career Clusters The state of Georgia recognizes these in the state. Ex. Agriculture, Food
User/Interest Groups These are made up of people who work or are interested in particular areas of technology. They meet on a regular basis and discuss new advances, common problems, trends and experiences in the field.
Workshops/Conferences These are one day to a week long gathering of workers and experts in a particular field of technology.
Professional Social Media Presence This is an account on a particular social platform held by an individual that reflects their interest in a particular field of technology. The platform is usually a popular one that other professionals in that field frequent.
Interpersonal Job Skills These include ~Active listening-hearing others and being aware of their needs ~Teamwork-helping a group to achieve a goal. ~Taking Initiative-knowing something that needs to be done and finding a way to get started.
Technical Skill Development Clubs like these hold meetings, conferences, create workshops and hold competitions that help develop awareness about and expertise in various skills. These all relate to career areas that students will be involved with in their near futures.
Charitable Work When you help someone else you help yourself; these types of groups usually pick an organization doing good work in an area they care about and hold some sort of activity to produce something that can be given to the charity or that assists in their goals
Benchmarking The process of measuring the organization's products, services, cost, procedures, etc. against competitors or other organizations that display a "best in class" record.
Leadership Practice These clubs elect officers, hold meeting and appoint other leaders to organize and direct projects. These activities give students opportunities to exercise skills in interpersonal relationships, dealing with adults and accomplishing goals.
AUP Some companies and organizations have this that governs what kind of use members of that group can make of the INternet and media available to them. Our school system has one that you have consented to by being here.
Copyright The owner's legal right to reproduce, display, transmit, and modify a work as well as the right to publicly perform a sound recording by digital transmission.
Creative Commons A license that lets you decide how others may use your work. This license allows you to keep your copyright but also allow other to copy and distribute you work provided they give you credit and only on the conditions you specify.
Fair use The idea that copyright material may be quoted without the need for permission from a payment to the original source, provided that a citation is clearly given and that the material quoted is reasonably brief.
Intellectual Property Includes are, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others.
Open Source Programming code with limited or no copyright restrictions, allowing you to legally modify and share the software program. The GIMP and Inkscape are open source graphical software tools. Notepad++, which is a web page code editor, is also an ex. of this.
Plagiarism Using someone else's words or ideas and passing them off as your own.
Cookies Small computer text files placed in your computer by the sites you visit that collect info about your computer system and the web pages you view.
Flame A deliberately mean-spirited message sent to others on the Internet.
Harassment To annoy someone repeatedly. For example, cursing at, following, or mocking someone online for negative purposes.
Predator One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. Usually an adult.
Phishing A con game that scammers use to collect personal information from unsuspecting users without them realizing it.
Piracy Theft of intellectual property-in other words, stealing what does not belong to you.
Software Patch Can be an upgrade(adding more features), a bug fix, a new hardware driver or update to address new issues such as security or stability problems.
Spyware Software that goes on you computer without your knowledge and steals private information. Typically it will get some information about you like where you live and use it to feed advertisements to you.
Trojan Horse Software programs that hide inside regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do great harm to your computer.
UPS-Uninterrupted Power Supply A large battery that is plugged into an outlet and that computer equipment is then plugged into. It sits between the outside power supply and the computer. It will instantly switch over to the battery back-up if the outside power supply goes down.
Virus A program that duplicate itself and spreads throughout your computer destroying files, changing data, hogging all your memory, or doing anything that is possible with a computer program. Viruses only damage software, not hardware.
Worm A type of virus that replicates itself, but does not change any files on your machine. However, worms can multiply so many times that they take up all your computer's available memory or hard disk space.
Authoritarian leadership A style of leadership in which the leader tells the employees what needs to be done and how to perform it without getting their advice or ideas.
Delegative Leadership A style of leadership in which the leader entrusts decision making to an employee or a group of employees. The leader is still responsible for their decisions.
Horizontal Leadership Viewing leadership as a system so that information becomes networked. Information now flows horizontally. Differs from traditional leadership in which we view information running vertically or in a hierarchical manner.
Participative Leadership A style of leadership in which the leader involves one or more employees in determining what to do and how to do it. The leader maintains final decision making authority.
Created by: Jaylbreak
Popular Computers sets




Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
restart all cards