Java Games: Flashcards, matching, concentration, and word search.

Everfi Ignition Vocabulary from Modules 1-7

Digital Literacy Curriculum from Everfi Ignition

AB
adwarecomputer software that displays advertisements
applicationcomputer software created for a particular task or tasks
biasa personal and sometimes unreasoned judgment or prejudice
bloga website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it
bystanderone present but not taking part in a situation or event
cell towera site containing antennas and other electronic communications equipment that makes up a cell in a cellular network
CPUthe device in a computer that carries out the functions for the computer
citationan act of quoting providing the specific source of the material
cloud computinga computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer
cookiea packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server; it is used to identify the user or track their access to the server
copyrightexclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death
coverage arearefers to the area in which a service provider offers its communication service
credibleoffering reason to be believed
cyberbullyingusing technology to harm others through deliberate, repeated, and hostile attacks
data packagewhat the cell phone company charges for use of the Internet of your smartphone
databasea computer system that stores enormous amounts of data
digital addictiona type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers
domain namea type of Internet address such as .gov for government, .edu for educational institutions, .com for commercial sites
downloadingreceiving data from a server or another computer system
e-mailelectronic mail sent between computer networks
emoticonthe use of letters and punctuation marks in a message that indicates the emotion of the text (e.g., :-) to mean happy)
e-readera device or computer program used for reading electronic books
Fair Usea limitation and exception to the exclusive right granted by copyright law to the author of a creative work
hackedmeans that your computer or computer network has been broken into
hard disk drive (HDD)a computer device that reads, writes, and stores digital data
hardwarethe physical parts of a computer
hosting servicea service that is usually operated by a company in order to provide access to the Internet through servers
HTTPa protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL
HTTPSA protocol or group of rules and function that is used to transfer data over the World Wide Web and is SECURE.
identity thefta form of fraud where one person assume the identity of another person
intellectual propertyproperty created from an original thought or idea
interferencerefers to any disruption or alteration of a signal in cell phones
Interneta vast global computer network which links smaller computer networks together
IP address(98.139.180.149) a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL
malwarecomputer software designed to harm a computer
memoryany data or information in a computer; it is commonly used to refer to RAM which is temporary and used to operate software
Moore's Lawsuggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making the computer speeds increase exponentially
MP3a common audio format for playback and storage of music on digital audio players
open sourcea way in which software is developed that allows access to the source code of an application or software and is free to update and use
piracythe unauthorized reproduction or copying of music, video, or literature without proper compensation or permission
plagiarismrepresenting the language or thoughts of an author as your own without indicating where the information is from
plug-insomething you can add to a software application to enhance its abilities
presentationa computer program used to display information, normally in the form of a slide show
processoranother term for the CPU of a computer
programmingthe process of designing, writing, testing, debugging, and maintaining the source code of computer programs
QR codeQuick Response code; a type of two-dimensional bar code, consisting of black modules in a square pattern on a white background that can hold a large amount of any kind of data
RAMcomputer memory that is temporarily used to allow program to operate; it temporarily storage programs being used along with any data being entered
search enginea computer program that locates information on the web
servera computer or series of computers that link other computers together and often stores important information
server farma cluster of computers used where there is the need for large server capacity and capability
service providera company or organization that offers a service, such as web, cable television or phone access
sextingthe act of sending inappropriate sexual material, usually text or images, between cell phones.
signal strengthrefers to the strength of a connection over a wireless telecommunications system
smartphonea cell phone that is designed to perform various computer applications including, but not limited to, email, browsing the web, playing video games, playing music, and watching videos
SMSshort message service; it is a text messaging service for cell phones
social mediamedia that use Internet and cell phone applications to interact, collaborate and create content
softwarecomputer programs that give instructions to a computer so that it functions
spamemail that is sent to large groups of people who did not sign up for it
spreadsheeta computer application that simulates a paper accounting worksheet; mainly used for financial calculations and planning
spywarea type of malware that unknowingly to a user collects information from a computer
SSLSecure Socket Layer; it is a protocol that provides security when communicating on the Internet
STEMrefers to careers in Science, Technology, Engineering, and Math
tablethighly portable computer shaped like a slate or pad featuring a touch screen for input
templatea standard design used in blogs, word processing documents, presentations, and spreadsheets to provide a structure for information
textspeakabbreviations and slang commonly used to shorten a text or instant message, like using "u" for "you" and "?s" for "questions"
uploadingSENDING data, from one computer to another
URLUniform Resource Locator; it's an address of a website like www.quia.com
viralan object or pattern or video that is quickly replicated and shared
virusa type of malware that replicates itself and spreads to other computers
Web 2.0refers to applications on the web that allow users to interact through user-generated content, design, and collaboration; includes the functions of social media sites
web browsersoftware that allows for navigating the web; it is different from a search engine in that it provides a window in which to search but does not conduct searches itself
webcama video camera for computers typically used to provide real-time video footage
wi-fiwireless fidelity; networking technology that allows computer devices such as PCs, laptops, and cell phones to communication over a wireless signal
wikia website that allows users to add and edit interlinking web pages
word processinga computer application used for the production of any sort of printable material; mostly used for reports, letters, newsletters, forms
wwwworld wide web; referred to as the web, it is a portion of the Internet that is accessed using a web browser

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities