Term
What is one of the biggest factors affecting education? |
|
Definition
|
|
Term
Which technological advance will NOT affect our personal lives in the future? |
|
Definition
|
|
Term
Which business will allow products to be bought and sold through the Internet? |
|
Definition
|
|
Term
Benefits of Genetic Engineering |
|
Definition
Enabling a fruit to ripen without getting squashy
Enabling an animal to do something it typically couldn't
Increasing resistance to disease
NOT
Increasing traffic flow problems |
|
|
Term
An artificial environment that feels like a real environment is known as |
|
Definition
|
|
Term
What type of activity uses the Internet for investigation and problem solving?
|
|
Definition
|
|
Term
What system allows users to pay online by transmitting a number from one computer to another? |
|
Definition
|
|
Term
Changing the DNA in a living organism is known as |
|
Definition
|
|
Term
The procesing of information on its own without human intervention is known as: |
|
Definition
|
|
Term
Models of real-world activities that allow you to explore environments that amy be dangerous or unavailable are called: |
|
Definition
|
|
Term
Using a computer as a tutor is called: |
|
Definition
|
|
Term
Delivery of education over the Internet is called |
|
Definition
|
|
Term
A helmet would be required if participating in which type of application?
|
|
Definition
|
|
Term
What is a software program that can be used to retrieve documents from the World Wide Web and to display them in a readable format? |
|
Definition
|
|
Term
Software that is given to a user free of charge on a trial basis is |
|
Definition
|
|
Term
What is a program that tricks users into thinking they have a virus? |
|
Definition
|
|
Term
Who is a person who breaks into your computer files with bad intentions? |
|
Definition
|
|
Term
What is a virus that is activated at a certain time or date? |
|
Definition
|
|
Term
What is a virus that masquerades as a useful program? |
|
Definition
Trojan Horse
It does something different from what it is expected to do. |
|
|
Term
How do software companies prevent users from making multiple copies of their software? |
|
Definition
|
|
Term
What is a type of virus that works its way slowly through file and deposits its destructive codes? |
|
Definition
Worm
It makes copies of itself resulting in the consumption of system resources that slows down or actually halts tasks. |
|
|
Term
Programs that allow a person to legally copy files and give them to anyone at no cost are called what? |
|
Definition
Public domain
It can be freely distributed to anyone. |
|
|
Term
When a virus is discovered on a computer, what should be done? |
|
Definition
Run a virus disinfectant program |
|
|
Term
If you would like to load copies of a commercial educational program on every computer in your school, you should |
|
Definition
|
|
Term
John buys a single-user license of Microsoft Office for his home computer. His friend asks to bottow the CD so that he can load it on his computer. This is an example of: |
|
Definition
|
|
Term
What is one way to safeguard access to a computer? |
|
Definition
|
|
Term
How is a computer protected from a virus? |
|
Definition
Install an anti-virus program. |
|
|
Term
The standards of good moral conduct or principles are known as what? |
|
Definition
Ethics
It means using a computer for good purposes. |
|
|
Term
What virus is triggered by the appearance or disappearance of specified data? |
|
Definition
|
|
Term
A program that is written to cause corruption of data on a computer is called what? |
|
Definition
|
|
Term
What criminal act is committed through the use of a computer? |
|
Definition
|
|
Term
What type of searching uses the asterisk * to search for plurals or variations of a word? |
|
Definition
|
|
Term
What type of searching consists of the three logical operators AND, NOT, and OR? |
|
Definition
|
|
Term
What type of searching would be used to locate words that must appear next to each other? |
|
Definition
|
|
Term
What type of search engine would be used to locate graphics, video clips, animation, and MP3 files? |
|
Definition
|
|
Term
What is another name for the Web site address? |
|
Definition
Universal Resource Locator |
|
|
Term
Examples of search engines, include: |
|
Definition
www.altavista.com
www.google.com
www.yahoo.com
NOT
www.findme.com |
|
|
Term
Electronic Mail (email) can be used for sending: |
|
Definition
Attachments
Image files
Messages to a friend
NOT
packages to friends |
|
|
Term
|
Definition
helps the user find a Web page quickly and easily by giving web search results when part of the URL is keyed in the address bar. |
|
|
Term
|
Definition
An automated feature that corrects typos as you type or key. |
|
|
Term
|
Definition
An automated feature that keeps track of and provides a list of sites the user has visited or fills our forms automatically. |
|
|
Term
|
Definition
this button connects you to the address that is displayed in the Address bar. |
|
|
Term
|
Definition
The small picture in the upper right corner of the browser window that means your browser is accessing data from a remote computer. |
|
|
Term
|
Definition
The horizontal menu that appears at the top of the window that provides a selection of options related to the Web page. |
|
|
Term
|
Definition
the bar on the top of the browser that contains the name of the document. |
|
|
Term
|
Definition
the area that contains the URL or web address of the active Web page. |
|
|
Term
|
Definition
The vertical and horizontal navigation tools that allow a user to see a Web page if it is too long or too wide to fit within one screen. |
|
|
Term
|
Definition
the search engine that uses keywords to perform searches. |
|
|
Term
|
Definition
a chat option the allows a user to specify a list of friends and even tell when their friends are online. |
|
|
Term
|
Definition
type of list allows one message to be sent to everyone in a particular group. |
|
|
Term
|
Definition
Using the computer to create real-time communication between you and another user or group of users. |
|
|
Term
|
Definition
the address rsmith@yahoo.com represents the user's domain name |
|
|
Term
|
Definition
user's name in the address, rsmith@yahoo.com |
|
|
Term
Attachments that could be sent with e-mail, include: |
|
Definition
Audio files
Documents
Pictures
NOT
packages |
|
|
Term
|
Definition
is the standard the defines how messages are formatted and transmitted. |
|
|
Term
|
Definition
is a series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen
and
the language used to create documents for the
World Wide Web |
|
|
Term
|
Definition
is the standard format for transferring data between two devices. |
|
|
Term
To connect to the Internet, you need a(an): |
|
Definition
Browser
ISP (Internet Service Provider)
Modem
NOT
a
Scanner. |
|
|
Term
|
Definition
a discussion forum or type of bulletin board. |
|
|
Term
IRC (Internet Relay Chat) |
|
Definition
|
|
Term
An educational institution email address looks like this |
|
Definition
|
|
Term
The parts of an e-mail address include: |
|
Definition
The user name
The @ symbol
The user's domain name
NOT
The user's password |
|
|
Term
|
Definition
www.microsoft.com
www.sprint.com
www.tide.com
NOT
abrothers@yahoo.com
|
|
|
Term
|
Definition
The "original" name of the Internet |
|
|
Term
TCP/IP
Transmission Control Protocol/Internet Protocol |
|
Definition
the set of protocols that computers use to communicate with each other on the Internet;
how computers communicate on the Internet
|
|
|
Term
|
Definition
software that allows a user to retrieve documents from the World Wide Web |
|
|
Term
|
Definition
a program that allows users to send messages or files electronically. |
|
|