Computers final
A system that verifies that user input is not computer-generated by having you type in distorted characters that appear on the screen.
CAPTCHA
The _____checklist helps you evaluate a Web page before you use it as an information source.
CARS
Symptoms include eyestrain, headaches, and dry, blurry, or double vision
Computer Vision Syndrome
Every domain name and its corresponding IP address are entered into a world-wide database called the _____.
Domain Name System
You can encrypt specific files and folders in Windows using _____.
EFS
A sign of Internet addiction
Excessive or continued gaming and social networking
Real-time location systems, such as RFID tags, use _____ technology.
GPS
Set up ____________ if you want to be notified when new online information about a topic becomes available.
Google Alerts
_____ is an organization that coordinates Internet addresses and domain names around the world.
ICANN
_____ browsing lets you surf the Internet without leaving cookies, history files, or personal data on the computer.
InPrivate
_____ is an example of a professional networking site where you keep in touch with business contacts.
A(n) _____ is usually a 3- to 4-digit number used to access your ATM account.
PIN
A(n) _________ is a data format used to provide frequently updated Web content delivered directly to your browser or e-mail software.
RSS feed
Blink more often, break up workflow, stop occasionally, and refocus eyes in the distance
Steps to take when working online or on a device for many hours
Type of malware that can disguise itself as a useful program or app
Trojan
The leading causes of office- and recreation-related repetitive strain injuries
Using computers and electronic devices
In a(n) _______, participants can use a chat window to send typed messages to each other.
Web conference
To check the _____ of an online resource, verify the facts that the resource provides.
accuracy
Because a blogger doesn't need to be online at the same time that readers are, a blog is considered _____ communication.
asynchronous
Technology that authenticates identity by scanning a person's physical characteristics, like fingerprints.
biometrics
Using a physical feature such as a fingerprint to verify someone's identity is also called _____.
biometrics
The _____ is the worldwide collection of blogs.
blogosphere
You can back up your files to remote servers over the Internet using ____, and you can then retrieve your data anytime from anywhere in the world.
cloud storage
A wiki is an example of a _____ Web site.
collaborative
Businesses participate in social networks to encourage _____ to post messages with questions, comments, and ratings.
consumers
A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers.
content aggregator
Identifying the author is one way to check the _____ of an online resource.
credibility
Besides passwords and firewalls, you can add an additional layer of protection for your computer data by using _____.
encryption
Technique used to scramble or code data that is transmitted over a network.
encryption
The study of safe and efficient working environments
ergonomics
Creates a blockade between a corporate or personal network and the Internet.
firewall
Often uses a moderator to approve messages before they are posted for others to read
forum
When you're looking for Web pages containing specific words or phrases, use a _______________ engine
general search
Search engines place the most relevant ___________ on the first few pages of search results.
hits
One-on-one real-time messaging
instant messaging
When preparing for a search, choose ________________ that make the search term unique and specific.
key words
Viruses, worms, Trojan horses
malware
A ____________ sends a query to many search engines at the same time.
metasearch engine
Members of a(n) _____ such as Twitter can post messages of up to 140 characters or links to Web pages.
microblog
A social network is a Web site that links people to form a(n) _____ with shared interests and experiences.
online community
A(n) _____ should contain at least six characters and use letters, uppercase letters, numbers, and symbols such as # or $.
password
Flicker, Shutterfly, and Photobucket are ________ social networks.
photo-sharing
Tapping into an unprotected Wi-Fi network
piggybacking
A(n) __________________ is an audio file stored online that can be distributed via download.
podcast
To customize search results, you can change _________ , such as the number of results displayed per page.
preferences
Technology used in IM, which lets one computing device identify the status of another
presence
On a social network, you create an online form to create a virtual identity, or _____, which includes information you choose to describe yourself.
profile
Evaluate the _____ of an online resource by assessing its objectivity.
reasonableness
A _____________ lets you search blogs, microblogs, comments, and conversations on social media sites.
social search tool
Junk e-mail
spam
A ____________ engine lets you search databases, news providers, or podcasts.
specialty search
A ___________ is a catalog of Web pages organized by topic.
subject directory
Links or citations to reputable sources or authorities show the information has _____.
support
Type of communication technology that requires all participants be online at the same time
synchronous
Form of communication that is also called SMS, for short message service
text messaging
Every domain name ends with an extension that indicates its _____.
top-level domain
Using two distinct items such as a a debit card along with a PIN to authenticate someone's identity is called _____.
two-step verification
One way to protect your devices using software
updates
Often used in combination with a password to gain entry to a computer system.
username
Passwords, PINs, and ____ are the keys to your personal accounts with online retailers, banks, and social sites.
usernames
A(n) ____________ allows people at two or more locations to meet electronically using a network to transmit video and audio data.
video conference
Authors of _____ mainly post video clips.
vlogs
A(n)___________ is a type of online conference where a presenter provides some type of instructional activity.
webinar
Everyone in your group can access and edit a collaborative Web site known as a(n) _____.
wiki
One way to refine a search term is to use a word base, or ____________ , to broaden the search.
word stem