Term
|
Definition
some people have been able to obtain their education with distance learning. The internet has been a way for people to do online learning, elementary school and secondary school. |
|
|
Term
|
Definition
instruction methods for which the teacher uses the computer to deliver the instructions. Mathmatical concepts as a tutor. movies projects homework lectures. Spanish and french |
|
|
Term
|
Definition
Role play are models of real word activities. Simulations are fun and engaging. You can find simulatons on the internet DVD |
|
|
Term
|
Definition
Science fiction movies Space Odyssey Cars that speaks |
|
|
Term
|
Definition
The most advances have been made in this area |
|
|
Term
|
Definition
These are computer programs that help us make a decision. help make the person make the right decision about an health insurance company |
|
|
Term
|
Definition
Humanoid robots like in star wars. Robots are used in assembly plants |
|
|
Term
|
Definition
Different things to different people. Artificial invironment. Back to the future. This is created with computer hardware and software |
|
|
Term
|
Definition
Relates to creating computers components that are les than 100 nanometers in size. something very small |
|
|
Term
|
Definition
Having an online business is changing our ways the world does business |
|
|
Term
|
Definition
One can buy and sell products on line. People may hesitate because of fear that someone might steal their card and information. By a bank |
|
|
Term
|
Definition
Taking someone elses idea or work |
|
|
Term
|
Definition
is a legal protection for authors of cretive work. It guards against the unlawful copying or using of someone elses original work. Buying aaa report from a "free term paper"
Having someone else write a paper for you |
|
|
Term
|
Definition
Getting into someone elses system and changing their information or creating a computer virus |
|
|
Term
|
Definition
manipulation of a computer or computer data in order to obtain money, property or value dishonesty or to cause loss. Stealing money from a bank account or stealing information from other peoples computer for gain. |
|
|
Term
|
Definition
Invading someone elses computer. hackers are computer experts who enjoy the power of invading someone else privacy |
|
|
Term
|
Definition
A program that has been written, usually by a hacker to cause the corruption of data on a computer |
|
|
Term
|
Definition
make many copies of itself. slow downloads. a worm do not haveto attach itself to other files |
|
|
Term
|
Definition
A virus that does not cause damage until a certain date or until the computer has been booted a certain number of times |
|
|
Term
|
Definition
Changing data before it is entered into the computer or after it has been entered into the computer |
|
|
Term
|
Definition
Illegally copying and using software |
|
|
Term
|
Definition
Any time you submit information on the Internet, it is possible for this infrmation to be used for various situations, School, banks, hospital and insurance companies and any other information on an every day activity |
|
|
Term
|
Definition
getting carpal tunnel syndrom. replace a regular keyboard with an ergonomic keyboard. This type of keyboard will take the stress of your wrist and reduce injuries. |
|
|
Term
Biometric Security measures |
|
Definition
Which examine a finger print a voice pattern or retina of the eye or iris |
|
|