Upgrade to remove ads
Internet Vocabulary Quiz
Terms in this set (47)
An application designed to search for viruses and repair files on a computer.
a list of citations that appear at the end of a paper, article, chapter or book.
Law granting a legal right to a copyright holder or author which requires their permission to make non-archival copies of the work in question.
A bully who operates online, in cyberspace; To bully online
The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
Technology that prevents users from visiting inappropriate web sites, and protects the network from unauthorized users.
Software written and then donated to the public, so anyone is free to copy it and share it with their friends. Ownership of the software is retained by the owner/software developer who may choose to charge for future releases of the software.
An unauthorized person who secretly gains access to computer files
short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent
Network etiquette; Online manners; the rules of conduct for online or internet users.
A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
To use the ideas or words of another person, but stating them in your own words.
the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
...a piece of writing that has been copied from someone else and is presented as being your own work
...A special computer used to store programs and files, and then sends it out to other computers one or all at a time.
...Software that can be tried before you purchase.
...online communities where people meet, socialize, exchange digital files, etc. example: facebook
...Programs that allow you to accomplish certain tasks such as write letters, analyze numbers, sort files, manage finances, draw pictures, and play games.
...unwanted/junk e-mail (usually sent out in bulk)
disguised as a useful application. Appears as something good until you open it up. Got its name from the Trojan-Greek War.
...Software program that is designed to damage files on a computer that receives it. The virus spreads from file to file on a single computer, and does not intentionally try to move to another computer. It must replicate (reproduce) and execute itself to be defined as a virus. Since the virus reproduces itself, it can spread to other application and operating system software. Some viruses cause little or no damage (they are more of a nuisance because they place messages on the monitor, etc); however, other viruses can destroy the hard drive and render the computer unusable.
...Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc. Unlike a true computer virus, a worm does not need a host file to move from one computer to the next; therefore, worms can spread more rapidly than viruses. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
...a separate document that you may send with an e-mail message. It might be a document, such as a report that you need to send to a teacher, or it could be a photograph or another type of computer file.
Web Log. websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic. serve many purposes from personal diaries to topical discussions.
a search strategy using keywords such as AND, OR, NOT that can often be used in keyword searches to narrow down your search results
software used to view various kinds of Internet resources found on the World Wide Web. Example: Internet Explorer, Google Chrome, Safari, Mozilla Firefox
Small text files that remember a user's personal preferences and settings and allows the web site's server to retrieve your information from its database.
different extensions of a website address. [a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
Electronic mail. Sending and receiving messages through a computer network. This process requires a computer, modem or network connection, and an e-mail address. It is convenient because all messages are sent and received immediately over short or long distances.
abbreviation for "hypertext markup language," a computer language used to create documents on the World Wide Web.
Text or graphics that, when clicked with a mouse, will connect the user to a new web page
A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
A number which identifies the location of a client computer (web surfer) on the Internet.
An Internet service provider is a company that offers its customer's access to the Internet for a monthly fee. Example: AOL, Grande, AT&T
A device that permits a computer to transmit and receive data over a telephone line.
Research that utilizes primary and secondary electronic resources such as CD-ROM, networked, and Internet encyclopedias, dictionaries, databases, video conferences, e-mail,etc.
To reload a webpage on the internet; appears as 2 green arrows at the top of the browser.
website that searches, gathers and identifies information from a database based on keywords, indices, titles and text. Example: www.google.com
Distance + Communications. The act of sending and receiving information electronically between two or more computers via modem and phone line or local area networks (LAN). The exchange of information can be within a building or around the globe.
Uniform Resource Locator. Full website address. Example: http://www.hayscisd.net
A video, image or text spread by "word of mouth" on the internet or by e-mail for humorous, political or marketing purposes.
A collaborative website which can be directly edited by anyone with access to it; Wikipedia.com
how many times a webpage was viewed
list of websites viewed
the name for a way to display information on websites. Website tabs resemble manilla folder tabs - that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views in the same browser.
This is the "electronic" world as perceived on a computer screen, the term is often used in opposition to the "real" world.
YOU MIGHT ALSO LIKE...
Nursing Informatics Chapter 4
OTHER SETS BY THIS CREATOR
MIT App Inventor Terms
Web page Design Vocabulary
robot C vocabulary
OTHER QUIZLET SETS
POLI 321 Exam 2
J401 Ch. 1-3