csa 2 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
Adware | computer software that displays advertisements |
Application | also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones |
Bias | a personal and sometimes unreasoned judgment or prejudice |
Blog | a website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it |
Bystander | one present but not taking part in a situation or event |
Cell tower | a site containing antennas and other electronic communications equipment, usually in a high place, that makes up a cell in a cellular network |
Central Processing Unit (CPU) | the central processing unit carries out the functions in a computer |
Citation | an act of quoting providing the specific source of the material |
Cloud computing | a computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer; some examples include word processing documents, e‐mail, and music files |
Cookie | a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server |
Copyright | exclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death |
Coverage area | refers to the area in which a service provider offers its communication service |
Credible | offering reason to be believed |
Cyberbullying | using technology to harm others through deliberate, repeated, and hostile attacks |
Data package | what the cell phone company charges for use of the internet of your smartphone |
Database | a computer system that stores enormous amounts of data |
Dead zone | an area where a cell phone does not receive a signal |
Digital addiction | a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers |
Digital security certificate | a certificate given to websites that verifies whether a website is secure or not |
Domain name | a type of internet address such as .gov for government, .edu for educational institutions, .com for commercial sites, etc. |
Downloading | receiving data, such as a music or video file, from a server or another computer system |
E‐mail | electronic mail sent between computer networks |
Emoticon | the use of letters and punctuation in a message that indicates the emotion of the text (e.g., :) to mean happy) |
E‐reader | a device or computer program used for reading electronic books |
Fair use | a limitation and exception to the exclusive right granted by copyright law to the author of a creative work |
Hacked | getting hacked means that your computer or computer network has been broken into without your permission |
Hard disk drive | a computer device that reads, writes, and stores digital data |
Hardware | the physical parts of a computer |
Hosting service | a service, such as web hosting, that is usually operated by a company in order to provide access to the Internet through servers |
HTTP | a protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL and is indicated by "http://" |
HTTPS | group of rules and functions that is used to transfer data over the World Wide Web and is secure; it is used for websites that handle sensitive information that would require greater security, such as payments and bank account information |
Identity theft | a form of fraud where one person assumes the identity of another person |
Intellectual property | property created from an original thought or idea |
Interference | refers to any disruption or alteration of a signal in cell phones Internet |
IP address | a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL |
Location‐based service | a service provided through cell phone networks and accessed by cell phones which uses location to provide information on various places like restaurants, offices, museums, schools, etc. |
Malware | computer software designed to harm a computer |
Memory | any data or information in a computer; it is commonly used to refer to read‐access memory (RAM) which is temporary and used to operate software; at times, it can also refer the amount of disk space available on a computer |
MMS | an abbreviation for multimedia messaging service, which allows for sending video, audio, pictures, ringtones, and any other media through a cell phone |
Moore’s Law | suggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making computer speeds increase exponentially; this law is related to other trends in digital technology |
MP3 | a common audio format for playback and storage of music on digital audio players |
Multimedia | content and media that combines different content forms, such as text, audio, animation, and still images |
Open source | a way in which software is developed that allows access to the source code of an application or software and is free to update and use |
Operating system | a group of software programs that provide instructions to a computer so that it may operate |
Piracy | the unauthorized reproduction or copying of music, video, or literature without proper compensation or permission |
Plagiarism | representing the language or thoughts of an author as your own, without indicating where the information is from |
Plug‐in | something you can add to a software application to enhance its abilities |
Presentation | a computer program used to display information, normally in the form of a slide show |
Processor | another term for the CPU of a computer—the central processing unit that runs computer programs |
Programming | the process of designing, writing, testing, debugging, and maintaining the source code of computer programs |
QR code | Quick Response code; a type of two‐dimensional bar code, consisting of black modules in a square pattern on a white background, that can hold a large amount of any kind of data |
RAM | computer memory that is temporarily used to allow programs to operate, which would be quicker than if they accessed ROM |
Roaming | the extension of service or coverage in a wireless telecommunications system |
Search engine | a computer program that locates information on the web |
Server | a computer or series of computers that link other computers together and often store important information |
Server farm | a cluster of computer servers used when there is the need for large server capacity and capability |
Service Provider | a company or organization that offers a service, such as web, cable television, or phone access |
Sexting | the act of sending inappropriate sexual material, usually text or images, between cell phones |
Signal strength | refers to the strength of a connection over a wireless (radio) telecommunication system |
Smartphone | a cell phone that is designed to perform various computer applications including, but not limited to email, browsing the web, playing video games, playing music, and watching videos |
SMS | also known as short message service; it is a text messaging service for cell phones |
Social media | media that use Internet and cell phone applications to interact, collaborate, and create content |
Social network | a website designed for groups of people who publish their own information and share it with others such as friends, family, co‐workers, etc. |
Software | a group of computer programs that give instructions to a computer so that it functions |
Spam | e‐mail that’s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses |
Spreadsheet | a computer application that simulates a paper accounting worksheet |
Spyware | a type of malware that unknowingly collects information from a computer |
SSL | an abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet |
STEM | refers to careers in science, technology, engineering, and mathematics |
Tablet | a highly portable computer shaped like slate or pad of paper, featuring a touch screen |
Template | a standard display design used in blogs to provide a structure for information to be viewed |
Textspeak | abbreviations and slang commonly used to shorten a text or instant message, like using "?s" for "questions" |
Uploading | sending data, such as a music or video file, from a local computer system to another computer system or server |
URL | the address of a website |
Viral | an object or pattern that is quickly replicated and shared |
Virus | a type of malware that replicates itself and spreads to other computers |
Web 2.0 | refers to applications on the web that allow users to interact through user‐generated content, design, and collaboration; includes the functions of social media websites |
Web browser | software that allows for navigating the web; it is different from a search engine in that it provides a window in which to search, but does not search itself |
Webcam | a video camera for computers typically used to provide real‐time video footage |
Wi‐Fi | networking technology that allows computer devices such as personal computers, laptops, and cell phones to communicate over a wireless signal |
Wiki | a website that allows users to add and edit interlinking web pages |
Word processing | a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material |
WWW | called "World Wide Web" or simply, "the web," it is a portion of the Internet that can be used through a web browser |
Created by:
spencercte
Popular Computers sets