Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Graves Protect Terms

Protecting your computer Terms

Software that monitors the system for viruses by looking at irregularities in the system. Anti-Virus Program
Computer vocabulary for a technically sophisticated user who spends many hours at a computer. Hacker
May also be referred to a person illegally entering a computer system without permission. Hacker
Expectations of conduct computer users must acknowledge while using an online service. Acceptable Use Policy
A device that connects a computer to an electrical outlet and protects the computer against sudden increases in electrical power. Surge Protector
A serious computer failure. This means that the computer itself stops working or that a program aborts unexpectedly. Signifies either a hardware malfunction or a very serious software bug. Crash
An error or defect in software or hardware that causes a program to malfunction. Bug
An identifier for an account. Username
A security code used to access an account. Password
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All are manmade. Virus
A program or code that makes the computer follow the wrong set of instructions. These can also replicate themselves. Virus
A program or algorithm that replicates itself over a computer network and usually performs malicious actions such as using up the computer's resources and possibly shutting the system down. One type of virus. Worm
Printed output or a piece of paper with data on it. Hard Copy
Making the computer restart by resetting is, perhaps by using a certain key combination. Warm Boot
Turning on the computer by using the power button. Cold Boot
Removing data from a file or removing a file from a storage device. Delete
Non-real-time communication using text over the web. E-mail
A file that's sent along with an electronic message. Paper clip icon. Attachment
A hacking technique used to fool a target into providing personal information to a fraudulent website meant to look real. Phishing
Unwanted e-mail that often tries to get the user to spend money. Spam
A kind of virus meant to look like something a user would want to open, like a game or movie file, so that it can be active to run its code. Trojan Horse
This kind of file can consist of text or graphics or both. It is dependent upon the application program for its creation. Document
Software that allows the parts of a computer or similar device to work together and that lets you operate it. Operating System
Another name for a computer program. Software that can be run on a computer that has a limited purpose or function. Application
Information stored as an organized series of bits so it can be recognized by computer software. File
Created by: EdwardgRM