1/89
Laundry, 10 things social media, privacy security, february 2021
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A fake product that imitates something valuable or important with the intent to deceive
Counterfeit
The contract you sign enabling you to live in an apartment or rental home for a fixed period of time
Lease
Taking steps to maintain health and prevent disease, especially through cleanliness
Hygiene
An essential ingredient in medical marijuana, this active ingredient in cannabis does not cause a high; Cannabidiol
CBD
The idea that consumers should routinely and automatically put money into savings before spending on anything else
Pay Yourself First
A legal document showing ownership of a vehicle
Title
Found on OTC medicines, this provides information to consumers about active ingredients, directions, purposes, uses, inactive ingredients, and warnings
Drug Facts label
Employer-sponsored retirement savings accounts that offer tax benefits
401(k)
The temperature zone between 40 and 140 degrees Fahrenheit in which bacteria can grow rapidly
Danger zone
The modification of a real-life environment by adding sound, visual elements, or other sensory stimuli
Augmented reality (AR)
The degree of consumer recognition of a product's distinctive qualities or image
Brand Awareness
Tax levied by the government directly on income
Income tax
Chemicals applied to materials to slow or prevent the start or growth of a fire
Flame retardant
A provision in an insurance policy that excludes and/or limits certain coverages
Exclusion
Considering environmental, economic, and social impacts of a product's entire life cycle
Life Cycle Thinking
A good that is manufactured for and sold under the name of a specific retailer, competing with brand-name products; also referred to as "private label" or "store brand"
Private brand
An organization of workers formed to represent members' interests in respect to wages, benefits, and working conditions
Labor Union
Inhaling vapor produced by an e-cigarette
Vaping
Federal law mandating a payroll tax on the paychecks of employees with matching contributions from employers
FICA
A model of production and consumption that creates regenerative industrial processes, enables resources to maintain their highest value for as long as possible, and eliminates waste and pollution
Circular economy
An organized plan for saving and spending based on your expected income and expenses
Budget
Money paid bi-weekly or monthly to an employee for performing a set of duties
Salary
Selecting a course of action after choosing from several alternatives
Decision making process
The conscious, active process of making choices to achieve your full potential
Wellness
Analysis of a product's environmental, economic and social effects throughout the product's life
Life Cycle Assessment
The digital simulation of lifelike scenarios for training purposes
Virtual Reality Training
Cleaning agents that loosen soils and keep them suspended in wash water
surfactant
Chemical substances used to solve common laundry problems such as stains
pretreatment
A U.S. Environmental Protection Agency labeling program designed to identify and promote energy-efficient products
Energy Star
A surfactant or a mixture of surfactants that increase the ability of water to remove soil from textiles
detergent
Bleach that is suitable for colorfast fabric, non-chlorine
AOB, activated-oxygen bleach
Instructions for garment laundering or maintenance, they may include care symbols
care labels
Necessary in front loading washing machines, they inhibit the formation of suds
foam regulators
Pictograms that indicate the mamufacturer's suggestion for garment care
care symbols
Found in detergent, they make fabrics appear whiter and brighter by enhancing the light reflected from a fabric surface
optic brighteners
An ingredient in detergent that binds malodor molecules to help keep textiles smelling fresh
neutralizers
Factors that work together for optimal cleaning: time, temperature, mechanical action, and chemistry
Sinners Circle
Washing machine designed to use less water and less energy than the traditional washer
HE, high efficiency
Requires manufacturers to attach care instructions to textiles
Care Label Rule
Federal agency that enforces the Care Label Rule
FTC, Federal Trade Commission
Reduce static electricity, wrinkling and make fabrics feel smooth
fabric softeners
Within the ______________, users engage in interactive experiences, connecting with both computer-generated environments and other users in a virtual-reality space.
Metaverse
In today's digital age, every interaction and online engagement leaves behind a lasting _________________, comprising a comprehensive record of your online activity, including likes, posts, and the information amassed about you through websites or apps.
Digital Footprint
When in need of immediate support, individuals can find solace by texting HOME to 741741, connecting them with a crisis counselor through the 24/7 ____________.
Crisis Text Line
Under the guise of trust, _____________________ employs deceptive tactics to manipulate individuals into revealing important information, ultimately serving fraudulent purposes.
Social Engineering
_____________________ ensnares individuals, entangling their thoughts and actions in a web of constant online presence, overpowering and neglecting other vital aspects of life.
Social Media Addiction
By adjusting and customizing ____________________, users can determine which information visitors can see and restrict access to their profile on various websites and apps.
Privacy Settings
By combing through vast amounts of user-generated data on social media platforms, _________________ uncovers valuable insights and provides actionable information about users.
Data Mining
Websites employ ______________________, sets of intricate formulas, to formulate effective content promotion strategies, ensuring the right information reaches the right audience at the right time.
Algorithms
In the realm of social media, individuals often curate their online presence in a _____________________ manner, showcasing themselves in a favorable light to create a positive impression.
Socially Desirable
Crafted with deceitful intent, __________________ disseminates biased or misleading information, cunningly promoting a particular point of view and manipulating public perception.
Propaganda
Despite the negative consequences it brings, _______________________ grips young people with an inability to control the urge to play video games, leading to a diagnosable mental health condition that requires attention and support.
Gaming Disorder
Driven by the malicious potential of technology, ________________________ stealthily employs various digital means to cause individuals to fear for their safety, subjecting them to relentless harassment and intimidation.
Cyberstalking
With the intent to harm, individuals engage in the malicious act of ______________________, publicly exposing personally identifiable information about others, breaching privacy and potentially causing severe consequences.
Doxxing
With their sensational and misleading headlines, ___________ lures users into clicking and exploring web content, designed to increase page views and generate revenue by exploiting curiosity and enticing engagement.
Clickbait
Embarking on a ______________ journey, they temporarily bid farewell to electronic devices like smartphones and computers, seeking respite from the digital realm.
Digital Detox
The online world poses numerous risks, including the _________________, where individuals' personal information can be exploited or exposed without their consent.
Invasion of Privacy
The detrimental impact of _______________________ becomes evident when time spent on social media displaces face-to-face interaction, leading to a decline in overall well-being.
Social Displacement
Nestled within the hidden recesses of the internet, the __________________ operates as an encrypted realm, eluding search engine indexing and necessitating specialized authorization to gain access.
Dark Web
____________________ empowers individuals to exercise conscious control over their behavior, thoughts, and emotions, ensuring appropriateness in their actions.
Self-Regulation
Crossing the line of personal boundaries, _____________________ occurs when individuals disclose an inappropriate amount of detail about their personal life.
Oversharing
Online user deliberately shares information about themselves
Active Digital Footprint
Criminal activity that involves the internet and a digital device
Cybercrime
Release of private or confidential information without authorization
Data Breach
A personal trail of online activity, including likes, posts, and information gathered about you through websites or apps
Digital Footprint
Likes, reactions, comments, and shares on social media
Engagement
When another user tracks you on social media, they can see the content you post on your account
Follower
Stealing and using another's personally identifying information for personal or financial gain
Identity theft
Social media personalities who share content that entertains, informs, and connects them with their followers
Influencer
Controlling the personal information you share and what you do online
Online privacy
The way a person is perceived based on their online content and interactions
Online reputation
Information collected without the user being aware it is happening, such as clicks, number of times a site is visited, or the IP address used
Passive digital footprint
Controls available on many social networking and other websites that allow users to limit who can access your profile and what information visitors can see
Privacy settings
Websites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts
Social media platform
Requires a user to prove their identity in two ways before gaining access to a program or website
Two-factor authentication-2FA
Malware
Short for malicious software, this could steal personal information from a computer or phone.
False--Phishing scams duplicate webpages and can infect your devices with malware or collect data.
T or F Experts say it is "safe" to click through a link in a trusted site.
Financial gain
What is the most common reason to steal another person's identity?
They are the most common "bad" passwords used in the United States.
You know they are numerals, but what else do 123456 and 123456789 have in common?
Location based services
Mobile devices can use LBS to track your location in real time. What is LBS?
Passive digital footprint
Information collected without the online user being aware.
2FA, two-factor authentication
This security setting requires a user to prove their identity in two ways before gaining access to a program or website.
Criminal activity that targets or uses a computer and the internet
What is cybercrime?
False--Kids Social Security numbers give thieves a "clean slate" to apply for credit cards, mortgages, and other financial fraud.
T or F Identity theft is a crime aimed at adults, not kids.
Privacy settings
These controls on social media sites allow a user to limit who can access their profile and information.
PPI, Personal Identifiable Information
Your birthday, driver's license number and bank account numbers are all examples of this.
Anti-virus software
To increase safety and security, install this on your cellphone.
A website/app that helps users save and organize their passwords.
What is a password manager?
Controlling the personal information you share and what you do online
Online privacy
Information users intentionally share about themselves through social media or online groups
Active digital footprint