Technology From Instagram

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/127

Last updated 3:17 PM on 3/28/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

128 Terms

1
New cards
FTC
Federal agency that protects consumers by promoting competition and preventing anticompetitive and unfair business practices
2
New cards
Affiliate marketing
A marketing arrangement in which a company pays other people, companies, or web sites a commission for traffic or sales
3
New cards
Social media
Websites and applications that enable users to create and share content or converse with others
4
New cards
Adware
Unwanted advertisements and pop-ups on a website that are used as a marketing tool
5
New cards
Podcast
A digital audio file made available on the Internet for downloading to a computer or portable media player and typically available as a series
6
New cards
RSS feed
Web feature with links or short headlines posted from various sites that users can access via subscription or e-mail e-blast An electronic newsletter often sent to subscribers on an e-mail list
7
New cards
Spyware
Infiltration software that secretly monitors online habits, usually to obtain sensitive information from the user's computer
8
New cards
Trojan Horse
A malicious computer program hidden inside legitimate software or downloads
9
New cards
Virus
A piece of computer code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
10
New cards
Hacker
A computer programmer who writes or uploads malicious software with the intention to harm computers or commit a crime
11
New cards
Federal Communications Commission (FCC)
Government agency that regulates communications by television, radio, satellite, and cable for all 50 states and U.S. territories
12
New cards
Encryption
The practice of encoding and decoding data, used online to protect users' information
13
New cards
Firewall
A network security device that monitors and blocks incoming and outgoing network traffic depending on security settings
14
New cards
Motherboard
The primary circuit board in a computer that contains the CPU, RAM, and other important hardware
15
New cards
Parental controls
Software tools that allow parents to set controls on their children's internet use and filter content they don't believe is suitable
16
New cards
Telecommunications Act
Federal law which allows anyone to enter any communications business and allows for competition between communications businesses
17
New cards
Video streaming
Content sent in compressed form over the Internet and displayed by the user in real-time
18
New cards
Public Service Announcement
A free advertisement used to get the public's attention about an important topic
19
New cards
Product placement
Advertising strategy in which a company's product is used on TV or in film in order to expose more potential consumers to it
20
New cards
Infomercial
A television program that is an extended advertisement and often includes testimonials, discussion, and a demonstration
21
New cards
Broadcasting company
An organization responsible for presenting news, media, or other topics to the public through radio, television, or an online format device
22
New cards
Web browser
A software program that enables users to access the internet from a computer, cell phone, or other Mobile hotspot A wireless access point that allows users to connect to the Internet from cell phones, tablets, or other devices
23
New cards
Net neutrality
Concept that all web traffic must be treated equally by Internet Service Providers
24
New cards
Viral marketing
Form of marketing that encourages consumers to share advertising messages on the Internet Opt-out Declining unwanted e-mail, phone calls, or other communication from a business
25
New cards
Opt-in
To agree to receive messages, emails, or other communication from a company
26
New cards
Affiliate marketing
Partnership between a person and a business in which the individual agrees to promote a company's products and earns money if others purchase from the business
27
New cards
Social media
Websites and applications that enable users to create and share content or to participate in social networking
28
New cards
RSS feed
Web feature with links or short headlines posted from various sites that users can access via subscription or e-mail
29
New cards
Bootleg
Unauthorized sale, duplication, or distribution of any product, including computer software
30
New cards
Cyber-bullying
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
31
New cards
Flaming
A searing e-mail, forum, social media, or newsgroup message in which the writer attacks another participant in overly harsh, and often personal, terms
32
New cards
Plagiarism
Using or taking credit for someone else's work without attribution
33
New cards
Piracy
The unauthorized use of someone else's work; illegally downloading or copying music or software
34
New cards
Computer forensics
A field that uses knowledge of technology and computer science for investigation
35
New cards
Digital footprint
Your personal trail of online activity, including likes, posts, and information gathered about you through websites or apps
36
New cards
Data breach
A digital security incident when someone gains unauthorized access to personal information
37
New cards
Keylogger
A form of software that tracks your typing, typically without you knowing and for malicious purposes
38
New cards
Malware
Short for malicious software; a file or program that is harmful to a computer
39
New cards
Social engineering
The use of deception to get people to disclose important information, often for fraudulent purposes
40
New cards
Privacy policy
A document that outlines how owners of a website use information they gather about users, customers or employees
41
New cards
Spam
Unwanted commercial email
42
New cards
Virus
A malicious program or file designed to duplicate and spread
43
New cards
Attachment
A file sent in an email message that opens in another program
44
New cards
Backup
A copy of important information stored in an alternate location so that it can be recovered
45
New cards
Disk drive
The device on a computer that allows it to read disks
46
New cards
File extension
The format of the file as identified by the period and letters following a file name (ex ‚pdf, doc)
47
New cards
RAM
Short term memory that your computer uses to actively run programs
48
New cards
Hardware
The machinery, wiring, and physical components of a computer or electronic system
49
New cards
Software
The non-physical elements of a computer that tell the hardware how to act
50
New cards
AUP
An agreement that outlines the rights, responsibilities, and guidelines of internet usage for a group
51
New cards
DSL
A type of internet technology that transmits data through telephone lines
52
New cards
FCC
an agency in charge of regulating digital communications and technological innovations such as internet, phone, television, and radio
53
New cards
HDMI
a cable and connector that transmits high quality audio and video between devices
54
New cards
LED
Light-emitting diode; a light source that illuminates when an electric current passes through it
55
New cards
RFID
a way to encode data into a small space and read it wirelessly through radio waves
56
New cards
LAN
a group of interconnected devices used within a relatively small space, typically all using the same internet source and devices
57
New cards
Cultural shorthand
this concept or behavior spreads from person to person, often by social media
58
New cards
Avatar
A character that represents an online user
59
New cards
Streaming
Content sent in compressed form over the Internet and displayed by the user in real time
60
New cards
Cookie
A small file of information from a web browser that is stored on a computer to make webpages load faster or save personal information
61
New cards
Mobile payment
Payment form that allows consumers to use websites, apps, or text messages to make payments from their mobile device
62
New cards
Adware
Unwanted advertisements and pop-ups on a website that are used as a marketing tool
63
New cards
e-blast
An electronic newsletter often sent to subscribers on an e-mail list
64
New cards
Cloud computing
Computing that relies on sharing computing resources rather than local servers or devices
65
New cards
Digitize
To translate into a digital form
66
New cards
Application
A computer program designed to be used by an end-user
67
New cards
Hardware
The physical components of a computer or device
68
New cards
Temporary Internet Files
The file where cached pages and other multimedia content are stored after visiting a Web site
69
New cards
Operating system
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
70
New cards
Audio
The ability to record, store, generate, manipulate, and reproduce sound
71
New cards
Graphics
Any computer device or program that enables a computer to display and manipulate pictures
72
New cards
Multimedia
The use of computers to present text, graphics, audio, video and animation in an integrated way
73
New cards
Animation
Simulating movement through a series of pictures or frames
74
New cards
Authentication
The process of proving an individual is a claimed identity
75
New cards
Authorization
The security mechanism determining and enforcing what authenticated users are authorized to do within a computer system
76
New cards
Backup
Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
77
New cards
Blacklist
A security mechanism that allows through elements (usernames. passwords) unless specifically listed (often types of software such as malware)
78
New cards
Cryptography
The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
79
New cards
Cybersecurity
The efforts to design, implement, and maintain security for an organizations network, which is connected to the Internet
80
New cards
Cyber espionage
The unethical act of violating the privacy and security of an organization in order to leak data or disclose internal, private, or confidential information
81
New cards
Cellular data
Also called mobile data, the default that provides access to the Internet when not within a Wi-Fi hotspot
82
New cards
Airplane mode
A setting found on most portable electronics that disables wireless transmitters like the cellular radio and Wi-Fi on the device
83
New cards
Tethering
Enables a device to connect to the internet using a cell phone
84
New cards
SMS
The standard text messaging service found on most mobile phones
85
New cards
SIM card
Subscriber Identity Module, a smart card that gives a mobile phone its phone number and customer identity
86
New cards
Roaming
Using the services of another cellular carrier when traveling in a foreign country or in an area where the primary carrier has no service
87
New cards
E-Wallet
A smartphone app that replaces the need to carry physical credit cards. debit cards and gift cards, as well as boarding passes and other forms of identification
88
New cards
Identity theft
A crime in which someone wrongfully obtains and uses another persons personal data in a way that involves fraud or deception. typically for economic gain
89
New cards
Pharming
Hackers redirect internet traffic from one website to a different. identical-looking site in order to trick users into entering their username and password into the fake site
90
New cards
Phishing
Pretending to be a legitimate business, thieves use email to trick users into giving them confidential private information
91
New cards
Pretexting
Thieves collect personal information under false pretenses such as pretending to be from a charity or other legitimate organization
92
New cards
Spoofing
Any technology that gathers information about a person or organization without their knowledge
93
New cards
Spyware
Using the services of another cellular carrier when traveling in a foreign country or in an area where the primary carrier has no service
94
New cards
Crimeware
A class of malware designed specifically to automate cybercrime
95
New cards
Background check
A review process by a company of a job applicant to determine if they are qualified. legitimate, and truthful, and whether anything in the person's past could harm the company
96
New cards
Branding statement
A short summary on a resume that efficiently and effectively describes a job seeker to prospective employers
97
New cards
Work-life balance
The amount of time you spend doing your job compared to the time you spend with family and doing things you enjoy
98
New cards
Work from home
Work done remotely rather than in an office
99
New cards
Onboarding
The process of introducing newly hired employees to the expectations, behaviors and culture of the company or organization
100
New cards
Firewall
Part of a computer system designed to block unauthorized access

Explore top flashcards

AP Psych: Unit 0
Updated 529d ago
flashcards Flashcards (78)
BIOL 460 Exam 1
Updated 1111d ago
flashcards Flashcards (69)
Science exam
Updated 966d ago
flashcards Flashcards (167)
Vocab. 251-300
Updated 1013d ago
flashcards Flashcards (50)
ICT
Updated 1107d ago
flashcards Flashcards (55)
AP Psych: Unit 0
Updated 529d ago
flashcards Flashcards (78)
BIOL 460 Exam 1
Updated 1111d ago
flashcards Flashcards (69)
Science exam
Updated 966d ago
flashcards Flashcards (167)
Vocab. 251-300
Updated 1013d ago
flashcards Flashcards (50)
ICT
Updated 1107d ago
flashcards Flashcards (55)