Home
Explore
Exams
Search for anything
Login
Get started
Home
ETECH
ETECH
0.0
(0)
Rate it
Studied by 8 people
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/175
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
176 Terms
View all (176)
Star these 176
1
New cards
Digital Divide
The gap between those who have easy access to digital technology and those who do not.
2
New cards
Social Media
Online platforms that allow users to create, share, and interact with content and other users.
3
New cards
Wi-Fi (Wireless Fidelity)
A wireless networking technology that allows devices to connect to the internet without cables.
4
New cards
Bluetooth
A short-range wireless communication technology for connecting devices.
5
New cards
Infrared (IR) Communication
Wireless data transfer technology that uses infrared light waves.
6
New cards
Mobile Hotspot
A feature that allows a mobile device to share its internet connection with other devices.
7
New cards
1G (First Generation)
The first generation of wireless communication, which used analog technology.
8
New cards
2G (Second Generation)
The transition from analog to digital communication, allowing for SMS and MMS messaging.
9
New cards
3G (Third Generation)
Mobile technology that introduced mobile internet and multimedia capabilities.
10
New cards
4G (Fourth Generation)
High-speed mobile internet that supports HD streaming and mobile applications.
11
New cards
GSM (Global System for Mobile Communication)
A standard for second-generation mobile networks.
12
New cards
GPRS (General Packet Radio Services)
A 2G/3G technology enabling mobile data services.
13
New cards
Data Services
Online services that provide information storage and processing over the internet.
14
New cards
Dial-up Internet
An early form of internet connection using telephone lines.
15
New cards
VPN (Virtual Private Network)
A secure connection that encrypts internet traffic and hides a user's IP address.
16
New cards
Internet of Things (IoT)
A network of connected devices that communicate and share data.
17
New cards
Artificial Intelligence (AI)
The simulation of human intelligence in machines to perform tasks like decision-making.
18
New cards
Machine Learning
A subset of AI where computers learn from data without explicit programming.
19
New cards
Natural Language Processing (NLP)
AI technology that enables machines to understand human language.
20
New cards
Computer Vision
The ability of AI to interpret images and videos.
21
New cards
Robotics
The branch of technology that designs and builds robots for automation.
22
New cards
Biometrics
The use of physical characteristics like fingerprints and facial recognition for authentication.
23
New cards
Quantum Cryptography
A secure communication method using quantum mechanics principles.
24
New cards
3D Imaging
The creation of three-dimensional visual representations.
25
New cards
Holography
A technique for recording and displaying 3D images.
26
New cards
Virtual Reality (VR)
A computer-generated simulation of an immersive environment.
27
New cards
Augmented Reality (AR)
Technology that overlays digital content on the real world.
28
New cards
Blockchain Technology
A decentralized digital ledger that records transactions securely.
29
New cards
Non-Fungible Tokens (NFTs)
Unique digital assets stored on a blockchain.
30
New cards
E-Commerce
Online buying and selling of goods and services.
31
New cards
M-Commerce
Mobile-based commerce using smartphones and tablets.
32
New cards
Online Learning
Education delivered via digital platforms.
33
New cards
Learning Management System (LMS)
A digital system used for managing and delivering online education.
34
New cards
Streaming Services
Online platforms that allow users to watch or listen to digital content on demand.
35
New cards
YouTube
A popular online video-sharing platform.
36
New cards
Cloud Computing
The delivery of computing services over the internet.
37
New cards
Cybersecurity
The practice of protecting systems and data from cyber threats.
38
New cards
Phishing
A cyberattack where attackers trick users into revealing sensitive information.
39
New cards
Big Data
Large volumes of structured and unstructured data analyzed for insights.
40
New cards
Edge Computing
Data processing that happens closer to the source rather than in centralized data centers.
41
New cards
Wearable Technology
Smart devices like smartwatches that track health and fitness data.
42
New cards
Smart Homes
Homes equipped with IoT devices for automation and convenience.
43
New cards
Cloud Storage
Online data storage services such as Google Drive and Dropbox.
44
New cards
Search Engine Optimization (SEO)
Techniques used to improve website ranking on search engines.
45
New cards
Digital Transformation
The integration of digital technology into all aspects of business and society.
46
New cards
Cyberbullying
Harassment or bullying that occurs online.
47
New cards
Smart Cities
Urban areas that use digital technology to enhance services and sustainability.
48
New cards
Online Safety
The practice of protecting oneself while using the internet by following security measures.
49
New cards
Netiquette
The set of rules governing proper and respectful behavior online.
50
New cards
Ransomware
A type of malware that encrypts a user's data and demands payment for decryption
51
New cards
Malware
Malicious software designed to harm, exploit, or otherwise compromise digital devices.
52
New cards
Trojan Horse
A type of malware that appears to be a legitimate file or program to trick users into downloading it.
53
New cards
Spyware
Software that secretly gathers user information and sends it to a third party.
54
New cards
Adware
Unwanted software that displays ads and can slow down device performance
55
New cards
Social Engineering
Psychological manipulation of people to disclose confidential information.
56
New cards
Cyberbullying
Bullying that occurs through digital devices like social media or messaging apps.
57
New cards
Online Libel
Publicly making false and damaging statements about someone on the internet.
58
New cards
Copyright
A legal protection given to original works like books, music, and art.
59
New cards
Patent
A right granted for a new, useful, and non-obvious invention.
60
New cards
Trademark
A symbol, word, or phrase legally registered to represent a company or product.
61
New cards
Fair Use
The limited use of copyrighted materials for education, criticism, or news reporting.
62
New cards
Digital Footprint
The trace of data a person leaves behind while using the internet.
63
New cards
Identity Theft
When a cybercriminal steals someone's personal information for fraudulent purposes.
64
New cards
Two-Factor Authentication (2FA)
An extra security layer requiring two forms of verification.
65
New cards
VPN (Virtual Private Network)
A tool that encrypts internet connections for secure browsing.
66
New cards
Strong Password
A password that includes letters, numbers, and special characters to enhance security.
67
New cards
Cybercrime
Any criminal activity that involves computers or the internet.
68
New cards
Hacking
The act of gaining unauthorized access to a system or network.
69
New cards
Software Piracy
The unauthorized reproduction and distribution of software.
70
New cards
Data Breach
A security incident where confidential information is exposed to unauthorized users.
71
New cards
Cyber Espionage
The act of spying on organizations or governments through cyber means.
72
New cards
Cryptojacking
The unauthorized use of a computer's processing power to mine cryptocurrency.
73
New cards
Online Privacy
The right to control personal information shared online.
74
New cards
Cyber Hygiene
The routine steps and best practices to maintain cybersecurity.
75
New cards
Social Media Ethics
The responsible use of social media, respecting privacy and digital etiquette.
76
New cards
Internet Fraud
Any type of fraud committed through the internet, including scams and identity theft.
77
New cards
Cyber Squatting
Registering domain names similar to well-known brands and selling them for profit.
78
New cards
Online Impersonation
Falsely representing another person on the internet, often for fraudulent purposes.
79
New cards
Digital Piracy
The illegal distribution or copying of digital content like music, movies, or software.
80
New cards
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
81
New cards
Worm
A type of malware that replicates itself and spreads to other computers without human action.
82
New cards
DoS Attack (Denial of Service)
An attack that overwhelms a system, making it inaccessible to users.
83
New cards
Strong Encryption
The process of converting data into a secure format that unauthorized parties cannot read.
84
New cards
Intellectual Property Rights
Legal protections for creations of the mind, including inventions, music, and trademarks.
85
New cards
Online Reputation
The perception others have of an individual or organization based on digital interactions.
86
New cards
Data Protection Laws
Regulations designed to safeguard individuals' personal data from misuse.
87
New cards
Cybersecurity Awareness
Educating people on digital threats and best practices for online safety.
88
New cards
Ethical Hacking
The act of legally testing and improving cybersecurity defenses.
89
New cards
Word Processing
The production, storage, and manipulation of text on a computer using a word processor.
90
New cards
Word Processor
A software application used for composing, editing, formatting, and printing documents.
91
New cards
Text Editors
Basic applications that only work with plain text and do not support formatting.
92
New cards
Microsoft Word
A word processor developed by Microsoft, first released in 1983 as Multi-Tool Word.
93
New cards
Quick Access Toolbar (QAT)
A customizable toolbar that contains frequently used commands.
94
New cards
Ribbon
A set of toolbars at the top of the Word window that organizes commands by tabs and groups.
95
New cards
File Tab
The tab that provides access to file management tasks such as opening, saving, and printing.
96
New cards
Dialog Box Launcher
A small icon that displays a dialog box with additional options for a command group.
97
New cards
Insertion Point
The blinking vertical line that indicates where text or graphics will be inserted.
98
New cards
Status Bar
Displays document information such as word count, page number, and proofing tools.
99
New cards
Ctrl + S
Shortcut for saving a document.
100
New cards
Ctrl + C
Shortcut for copying text.
Load more
Explore top notes
Proteins from Primary to Quaternary Structure
Updated 71d ago
Note
Preview
Chapter 9: Sensation and Perception
Updated 741d ago
Note
Preview
Properties of Water and Macromolecules
Updated 831d ago
Note
Preview
GPCOM PRELIMS
Updated 366d ago
Note
Preview
Water Cycle
Updated 918d ago
Note
Preview
Chapter 14: Stress, Lifestyle, and Health
Updated 940d ago
Note
Preview
Chapter 20: Earth Materials
Updated 695d ago
Note
Preview
Every Social Movement to Know for AP United States History
Updated 140d ago
Note
Preview
Explore top flashcards
Histo block 4
Updated 344d ago
Flashcards (25)
Preview
Chapter Two
Updated 70d ago
Flashcards (26)
Preview
Metacognitive illusions
Updated 88d ago
Flashcards (20)
Preview
Défi 2 mission 3
Updated 858d ago
Flashcards (27)
Preview
Au restaurant
Updated 468d ago
Flashcards (23)
Preview
Chapter 9 (final)
Updated 864d ago
Flashcards (22)
Preview
Lecture 28-30 (Types of Hypersensitivity)
Updated 415d ago
Flashcards (147)
Preview
Psychology recap A level paper 3
Updated 15m ago
Flashcards (163)
Preview