Upgrade to remove ads
Unit 3: Web Browsers, Email, and Safe Computing
Terms in this set (33)
What is a network application?
is a computer application in which either the program you are using, the data you are working with, or both, are on a network.
List two examples of network applications:
web browser and email
what is a web browser?
are networks appilcations used to access the internet.
what does URL stand for?
uniform resource locator
write the correct term after each letter:
______ ____________________________ ______________________________
a. b. c.
what is protocol?
the language computers use to "talk" to one another.
what does the host identify?
identifies the resources (network device computer, web page)
what does the location in a URL identify?
identifies where to find a resource on the host.
Emails can be organized into _________. Instead of folders, Gmail uses _______ to organize email messages.
what does the inbox do?
hold the emails you receive
where would you find a message that you did not finish writing?
who is the recipient?
the person to whom the email is being sent.
what is the difference between the archive and trash folders?
Archiving an email gets the message out of your inbox folder, but saves the email message so that you can always find it later. Putting a message in the trash folders gets the message ready to be deleted.
what is forwarding?
an email sends the email you just read to a new recipient.
what is an attachment?
a file that is sent along with an email message.
what does Cc stand for, and why would you use it?
when you want to send an email to someone, and send the exact same copy of the email to one or more other people.
What does Bcc stand for, and why would you use it?
Blind Carbon Copy.
to hide the multiple recipients' email address.
An address book is also called _______
what are two reasons for using an address book?
save and look up people names, email address, and other contact information. you don't have to remember everyone's email addresses.
what is hacking?
is the act of cracking into a computer to steal information.
what is malware?
is software that has malicious intent.
_______ spread from one machine to another, rapidly, without human action.
A ______________ attaches itself to a file or program, enabling it to spread form one computer to another.
List three ways you might spot a computer virus.
subject line, attachment, and sender.
Antivirus software is a computer program that _____, _______, and _________ to disarm or remove malicious software programs.
list two ways that malware can be shared:
E-mail attachments, fictitious websites.
List four ways to avoid hacking/malware attacks?
a. do not open emails or attachments from unfamiliar email addresses.
b. questions suspicious attachments from people you know.
c. right-click the pop-up taskbar to use the task manager to close pop-up ads.
d. use tools to prevent viewing potentially dangerous sites.
What is the internet term for junk mail?
The primary goal of an internet scam is just to tease someone with fake information.
List three common email scams:
dating scams, investment schemes, claims you won the lottery.
What is phishing?
is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers.
Strong passwords may include these elements:
upper and lower case letters
numbers and symbols
8 or more characters
what are steps you can take to protect your passwords?
don't use information that is personal or easy to guess. Don't share your passwords with anymore. Change your password frequently or use a different password for every site.
YOU MIGHT ALSO LIKE...
Web Browsers, Email and Safe Computing
Chapter 17 Criminal Investigations
Computers. Chapter 10
OTHER SETS BY THIS CREATOR
Page 127 Vocabulary
Page 113 Vocabulary
Page 109; Vocabulary
Page 105; Vocabulary