Create an account
floppy drive-A; Hard drive-C; Network drive-H; USB drive-D
what are the types of drives and their letters?
manages files systems, controls imput and output devices, and facilitates networking
software designed to infiltrate or damage a computer system without a user's information consent
pop-ups, security holes, untrustworthy files, software with malware bundled in it
what are ways we get malware?
delete/destroy files, slow computer down, steal information, crash computers
why are viruses and worms harmful?
an IT security device that will permit or deny traffic to protect our information
what is a firewall and why do we have it?
protect our computers by keeping out malware and block sites that go against our code of conduct
why do we have filters?
two or more computers connected together via a telecom system in order to share resources and information
addressing, audience, subject lines, open and close property, grammar, proofread, and watch sarcasm
what are the guidelines for good etiquette?
capacity of a computer to learn and make decisions in order to solve problems
searching, fitting constraints, recognizing patterns, logical inferences
what are the four methods of solving problems that make up AI
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together