Capstone from LifeSmarts Quizlets Imports

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

flashcard set

Earn XP

Description and Tags

Laundry, 10 things social media, privacy security, february 2021

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

A fake product that imitates something valuable or important with the intent to deceive

Counterfeit

2
New cards

The contract you sign enabling you to live in an apartment or rental home for a fixed period of time

Lease

3
New cards

Taking steps to maintain health and prevent disease, especially through cleanliness

Hygiene

4
New cards

An essential ingredient in medical marijuana, this active ingredient in cannabis does not cause a high; Cannabidiol

CBD

5
New cards

The idea that consumers should routinely and automatically put money into savings before spending on anything else

Pay Yourself First

6
New cards

A legal document showing ownership of a vehicle

Title

7
New cards

Found on OTC medicines, this provides information to consumers about active ingredients, directions, purposes, uses, inactive ingredients, and warnings

Drug Facts label

8
New cards

Employer-sponsored retirement savings accounts that offer tax benefits

401(k)

9
New cards

The temperature zone between 40 and 140 degrees Fahrenheit in which bacteria can grow rapidly

Danger zone

10
New cards

The modification of a real-life environment by adding sound, visual elements, or other sensory stimuli

Augmented reality (AR)

11
New cards

The degree of consumer recognition of a product's distinctive qualities or image

Brand Awareness

12
New cards

Tax levied by the government directly on income

Income tax

13
New cards

Chemicals applied to materials to slow or prevent the start or growth of a fire

Flame retardant

14
New cards

A provision in an insurance policy that excludes and/or limits certain coverages

Exclusion

15
New cards

Considering environmental, economic, and social impacts of a product's entire life cycle

Life Cycle Thinking

16
New cards

A good that is manufactured for and sold under the name of a specific retailer, competing with brand-name products; also referred to as "private label" or "store brand"

Private brand

17
New cards

An organization of workers formed to represent members' interests in respect to wages, benefits, and working conditions

Labor Union

18
New cards

Inhaling vapor produced by an e-cigarette

Vaping

19
New cards

Federal law mandating a payroll tax on the paychecks of employees with matching contributions from employers

FICA

20
New cards

A model of production and consumption that creates regenerative industrial processes, enables resources to maintain their highest value for as long as possible, and eliminates waste and pollution

Circular economy

21
New cards

An organized plan for saving and spending based on your expected income and expenses

Budget

22
New cards

Money paid bi-weekly or monthly to an employee for performing a set of duties

Salary

23
New cards

Selecting a course of action after choosing from several alternatives

Decision making process

24
New cards

The conscious, active process of making choices to achieve your full potential

Wellness

25
New cards

Analysis of a product's environmental, economic and social effects throughout the product's life

Life Cycle Assessment

26
New cards

The digital simulation of lifelike scenarios for training purposes

Virtual Reality Training

27
New cards

Cleaning agents that loosen soils and keep them suspended in wash water

surfactant

28
New cards

Chemical substances used to solve common laundry problems such as stains

pretreatment

29
New cards

A U.S. Environmental Protection Agency labeling program designed to identify and promote energy-efficient products

Energy Star

30
New cards

A surfactant or a mixture of surfactants that increase the ability of water to remove soil from textiles

detergent

31
New cards

Bleach that is suitable for colorfast fabric, non-chlorine

AOB, activated-oxygen bleach

32
New cards

Instructions for garment laundering or maintenance, they may include care symbols

care labels

33
New cards

Necessary in front loading washing machines, they inhibit the formation of suds

foam regulators

34
New cards

Pictograms that indicate the mamufacturer's suggestion for garment care

care symbols

35
New cards

Found in detergent, they make fabrics appear whiter and brighter by enhancing the light reflected from a fabric surface

optic brighteners

36
New cards

An ingredient in detergent that binds malodor molecules to help keep textiles smelling fresh

neutralizers

37
New cards

Factors that work together for optimal cleaning: time, temperature, mechanical action, and chemistry

Sinners Circle

38
New cards

Washing machine designed to use less water and less energy than the traditional washer

HE, high efficiency

39
New cards

Requires manufacturers to attach care instructions to textiles

Care Label Rule

40
New cards

Federal agency that enforces the Care Label Rule

FTC, Federal Trade Commission

41
New cards

Reduce static electricity, wrinkling and make fabrics feel smooth

fabric softeners

42
New cards

Within the ______________, users engage in interactive experiences, connecting with both computer-generated environments and other users in a virtual-reality space.

Metaverse

43
New cards

In today's digital age, every interaction and online engagement leaves behind a lasting _________________, comprising a comprehensive record of your online activity, including likes, posts, and the information amassed about you through websites or apps.

Digital Footprint

44
New cards

When in need of immediate support, individuals can find solace by texting HOME to 741741, connecting them with a crisis counselor through the 24/7 ____________.

Crisis Text Line

45
New cards

Under the guise of trust, _____________________ employs deceptive tactics to manipulate individuals into revealing important information, ultimately serving fraudulent purposes.

Social Engineering

46
New cards

_____________________ ensnares individuals, entangling their thoughts and actions in a web of constant online presence, overpowering and neglecting other vital aspects of life.

Social Media Addiction

47
New cards

By adjusting and customizing ____________________, users can determine which information visitors can see and restrict access to their profile on various websites and apps.

Privacy Settings

48
New cards

By combing through vast amounts of user-generated data on social media platforms, _________________ uncovers valuable insights and provides actionable information about users.

Data Mining

49
New cards

Websites employ ______________________, sets of intricate formulas, to formulate effective content promotion strategies, ensuring the right information reaches the right audience at the right time.

Algorithms

50
New cards

In the realm of social media, individuals often curate their online presence in a _____________________ manner, showcasing themselves in a favorable light to create a positive impression.

Socially Desirable

51
New cards

Crafted with deceitful intent, __________________ disseminates biased or misleading information, cunningly promoting a particular point of view and manipulating public perception.

Propaganda

52
New cards

Despite the negative consequences it brings, _______________________ grips young people with an inability to control the urge to play video games, leading to a diagnosable mental health condition that requires attention and support.

Gaming Disorder

53
New cards

Driven by the malicious potential of technology, ________________________ stealthily employs various digital means to cause individuals to fear for their safety, subjecting them to relentless harassment and intimidation.

Cyberstalking

54
New cards

With the intent to harm, individuals engage in the malicious act of ______________________, publicly exposing personally identifiable information about others, breaching privacy and potentially causing severe consequences.

Doxxing

55
New cards

With their sensational and misleading headlines, ___________ lures users into clicking and exploring web content, designed to increase page views and generate revenue by exploiting curiosity and enticing engagement.

Clickbait

56
New cards

Embarking on a ______________ journey, they temporarily bid farewell to electronic devices like smartphones and computers, seeking respite from the digital realm.

Digital Detox

57
New cards

The online world poses numerous risks, including the _________________, where individuals' personal information can be exploited or exposed without their consent.

Invasion of Privacy

58
New cards

The detrimental impact of _______________________ becomes evident when time spent on social media displaces face-to-face interaction, leading to a decline in overall well-being.

Social Displacement

59
New cards

Nestled within the hidden recesses of the internet, the __________________ operates as an encrypted realm, eluding search engine indexing and necessitating specialized authorization to gain access.

Dark Web

60
New cards

____________________ empowers individuals to exercise conscious control over their behavior, thoughts, and emotions, ensuring appropriateness in their actions.

Self-Regulation

61
New cards

Crossing the line of personal boundaries, _____________________ occurs when individuals disclose an inappropriate amount of detail about their personal life.

Oversharing

62
New cards

Online user deliberately shares information about themselves

Active Digital Footprint

63
New cards

Criminal activity that involves the internet and a digital device

Cybercrime

64
New cards

Release of private or confidential information without authorization

Data Breach

65
New cards

A personal trail of online activity, including likes, posts, and information gathered about you through websites or apps

Digital Footprint

66
New cards

Likes, reactions, comments, and shares on social media

Engagement

67
New cards

When another user tracks you on social media, they can see the content you post on your account

Follower

68
New cards

Stealing and using another's personally identifying information for personal or financial gain

Identity theft

69
New cards

Social media personalities who share content that entertains, informs, and connects them with their followers

Influencer

70
New cards

Controlling the personal information you share and what you do online

Online privacy

71
New cards

The way a person is perceived based on their online content and interactions

Online reputation

72
New cards

Information collected without the user being aware it is happening, such as clicks, number of times a site is visited, or the IP address used

Passive digital footprint

73
New cards

Controls available on many social networking and other websites that allow users to limit who can access your profile and what information visitors can see

Privacy settings

74
New cards

Websites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts

Social media platform

75
New cards

Requires a user to prove their identity in two ways before gaining access to a program or website

Two-factor authentication-2FA

76
New cards

Malware

Short for malicious software, this could steal personal information from a computer or phone.

77
New cards

False--Phishing scams duplicate webpages and can infect your devices with malware or collect data.

T or F Experts say it is "safe" to click through a link in a trusted site.

78
New cards

Financial gain

What is the most common reason to steal another person's identity?

79
New cards

They are the most common "bad" passwords used in the United States.

You know they are numerals, but what else do 123456 and 123456789 have in common?

80
New cards

Location based services

Mobile devices can use LBS to track your location in real time. What is LBS?

81
New cards

Passive digital footprint

Information collected without the online user being aware.

82
New cards

2FA, two-factor authentication

This security setting requires a user to prove their identity in two ways before gaining access to a program or website.

83
New cards

Criminal activity that targets or uses a computer and the internet

What is cybercrime?

84
New cards

False--Kids Social Security numbers give thieves a "clean slate" to apply for credit cards, mortgages, and other financial fraud.

T or F Identity theft is a crime aimed at adults, not kids.

85
New cards

Privacy settings

These controls on social media sites allow a user to limit who can access their profile and information.

86
New cards

PPI, Personal Identifiable Information

Your birthday, driver's license number and bank account numbers are all examples of this.

87
New cards

Anti-virus software

To increase safety and security, install this on your cellphone.

88
New cards

A website/app that helps users save and organize their passwords.

What is a password manager?

89
New cards

Controlling the personal information you share and what you do online

Online privacy

90
New cards

Information users intentionally share about themselves through social media or online groups

Active digital footprint