6th Grade Computers Vocabulary Final
Across
- 5. to act like another person.
- 6. To transfer (as data or files) from another computer onto your computer. Music from the apple store is a common example
- 12. The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
- 16. Programs that search documents for specified keywords and returns a list of the documents where the keywords were found.
- 17. A set of icons or buttons that are part of a software program's interface or an open window
- 21. Short for “Web Log,” this term refers to a list of journal entries posted on a Web page.
- 22. Any device that outputs information from a computer, the most common output devices are the monitor and speakers
- 24. an online discussion site where people can hold conversations in the form of a posted message
- 26. aggressive pressure or intimidation.
- 27. programs usually center on efforts to create content that attracts attention and encourages readers to share it with their social networks.
- 29. specifically refers to a character that represents an online user.
- 31. Describes the trail you leave in cyberspace and on any form of digital communication.
- 33. The legal rights that are granted to a person (artist, author, etc…) for their work, so they can be the only one to distribute, reproduce, etc… for own work.
- 36. A funny name for a noun that describes a small piece of information about you. Stored information on your computer
- 38. A general term that describes computer programs
- 39. Defines the structure and type of data stored in a file
- 40. Not identified by name; of unknown name.
- 41. The do’s and don’ts of online communication.
- 43. Media that is considered “old”, such as radio, television, and especially newspaper.
Down
- 1. Any device that provides input to a computer. There are dozens of possible input devices, but the two most common ones are a keyboard and mouse
- 2. a vitriolic or abusive message posted on the internet or sent by email, typically in quick response to another message.
- 3. someone who follows the forum but doesn’t post.
- 4. When someone takes someone else’s words and using them as their own.” Copying someone else’s work without paraphrasing or giving them credit
- 7. any action that takes place over the internet that may have intentional negative consequences to a person, or another piece of technology.
- 8. One who uses cyber space to hunt human beings with the intent to exploit, gain information, money, or possessions.
- 9. Learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
- 10. to attack the reputation of a person.
- 11. a brief message on a twitter account.
- 13. The illegal use of someone else's personal information (example: a Social Security number) in order to obtain money or credit
- 14. When someone installs and uses commercial software without paying for it.
- 15. a digital audio or video file or recording, usually part of a themed series that can be downloaded from a Web site to a media player or computer.
- 18. The buying and selling of product or service over electronic systems such as the Internet and other computer networks
- 19. A unique name that identifies a website. All domain names have a domain suffix, such as .com, .net, or .org. The domain suffix helps identify the type of website the domain name represents
- 20. Any technology that aids in gathering information about a person or organization without their knowledge
- 23. To transfer (as data or files) from your computer onto another computer. Illegally sending music from your computer to friends is an example
- 25. Any hardware, software or system that helps its user accomplish a task
- 28. The primary user interface of a computer. When you boot up your computer, the desktop is displayed once the startup process is complete
- 30. a book-length publication in digital form, consisting of text,images, or both, and produced on, published through, and readable on computers or other electronic devices.
- 32. A word, group of words, or image that you can click on to jump to another document
- 34. The art of deliberately, cleverly, and secretly ticking people off, usually via the internet, using dialogue
- 35. A program that allows you to access the Internet, Ex: Internet Explorer, Firefox, etc…
- 37. Most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email
- 38. when one person is being bullied through the use of technology.
- 42. A computer program that can negatively affect the health of your computer.