Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

V-CDC-NorthStar

NorthStar Digital Literacy Vocabulary

TermDefinition
Android An operating system used on smartphones and tablets. Example: My new smartphone runs on the latest version of Android.
Antivirus Application Software that is used to detect and eliminate computer viruses. Example: Make sure to regularly update your antivirus application to protect your computer from malware.
Asynchronous Communication Communication that does not happen in real time. Example: Email is an example of asynchronous communication because messages can be sent and received at different times.
Attribution Giving credit to the author or owner for their work. Example: It's important to provide proper attribution when using someone else's ideas in your research paper.
Bcc A blind carbon copy (Bcc) is a method used in an email application to send a message while keeping the identity of the receiver private. Example: I sent the email to my team with my boss Bcc'd to keep him informed without cluttering everyone's inboxes.
Blog An online journal that is commonly used to write about one's experiences, opinions, or to give a review. Example: She started a fashion blog to share her style tips and outfit inspirations with her followers.
Bookmark A way of saving a web page address to reference or return to later. Example: I bookmarked the recipe page so I can easily find it again when I want to cook dinner.
Browser An application used to access websites on the internet. Example: I use Google Chrome as my primary web browser because it's fast and user-friendly.
Browser History A list of websites that have been visited on the internet; this includes any data associated with the website and how long the user was on the website. Example: I accidentally deleted my browser history and now I can't remember the website I visited.
Cable Internet Transmits data through a cable television network as a means to connect a computer to the internet. Example: We switched to cable internet because it provides faster and more reliable connection compared to DSL.
Cc A carbon copy (Cc) is a method used in an email application to send a copy of the email to someone. A Ccd recipient is not required to respond to the message. Example: I cc'd my colleague on the email so she would be aware of the upcoming meeting.
Citation A means of giving credit to a source when their information is used. Example: The student included proper citations for all the sources used in her research paper.
Computer Ethics A set of principles that help users determine what is right or wrong in regards to computers. Example: Following computer ethics guidelines helps ensure responsible and ethical use of technology.
Computer Virus A software program that is loaded onto a computer, and then duplicates itself, spreading and infecting programs and files on the computer. Example: My computer got infected with a virus after I accidentally clicked on a suspicious link.
Creative Commons License A free license used by creators to permit others to use their content, free of charge, as long as they follow the license rules. Example: The photographer released their images under a Creative Commons license, allowing others to use them.
Cyberbullying The deliberate use of harmful words or pictures to cause embarrassment, hopelessness, or to intimidate another person online repeatedly. Example: Cyberbullying can have serious consequences on a person's mental health and well-being.
Desktop Interface Icons and menus on the computer that allow the user to interact with the operating system. Example: The desktop interface of the operating system allows users to easily access their files and applications.
DSL A digital subscriber line (DSL) transmits data digitally over phone lines. Example: Although DSL is slower than cable internet, it's still a popular choice in rural areas where cable infrastructure is not available.
Email A method of communication used to send electronic messages using the internet. Example: I'll send you an email with the details of the meeting agenda.
Ethernet Cable The cable used to connect computers in a network. An Ethernet cable allows data to be transferred from one computer to another computer. Example: I connected my computer to the router using an Ethernet cable for a more stable internet connection.
Font A typeset that has a particular face and size. Example: I changed the font of my presentation to make it more visually appealing.
Hardware Physical components of a computer system such as a keyboard, mouse, or modem. Example: The IT department is responsible for maintaining all the hardware in the office, including computers and printers.
HTML Hypertext Markup Language (HTML) is used to mark a web pages structure using tags so that the web browser displays the content correctly. Example: Learning HTML is essential for anyone interested in building websites.
Instant Messaging A means of text transmission sent in real time over the internet. Example: We use Slack for instant messaging at work to communicate with team members in real-time.
Internet A network of computers that provides access to information on the web. Example: The internet has revolutionized the way we access information and communicate with others around the world.
Intranet A restricted private network used by organizations to communicate. Example: Employees can access company documents and resources through the company's intranet.
Malware A virus or Trojan horse designed to cause harm to a computer or device. Example: Make sure to run a malware scan on your computer regularly to protect against viruses and other malicious software.
Modem A device that translates analog carrier signals to encode and decode digital information. Example: The modem converts digital signals from the computer into analog signals for transmission over the phone line.
Naming Convention A chosen method for organizing and naming files and folders. Example: Our company has a strict naming convention for files to ensure consistency and organization.
Navigation Tracking A tool that provides directions using satellites. Example: The GPS system provides accurate navigation tracking to help drivers reach their destination.
Network Computers that are connected through cable or Wi-Fi to share resources. Example: Our office computers are connected to the same network, allowing us to share files and printers.
Network Adapter Hardware that is used to connect a computer to another computer or server over a local area network. Example: I installed a new network adapter in my computer to improve its Wi-Fi connectivity.
Online Anonymity The state of being anonymous online. Example: Some people use VPNs to maintain online anonymity and protect their privacy.
Open Source Software that can be modified and distributed to others. Example: WordPress is an example of open-source software that allows users to customize and modify their website's code.
Operating System Software that manages all of the installed applications and hardware on a computer or device. Example: Windows and macOS are examples of operating systems that manage computer hardware and software resources.
Page Orientation How a document is displayed on a screen or in printed form. Example: When printing the document, make sure to select the correct page orientation (portrait or landscape) to fit the content.
Password A secret set of characters that are used to access a computer system or service. Example: Don't forget to change your password regularly to keep your accounts secure.
Personal Identifiable Information Information that can be used to distinguish or track a person's identity. Example: Social security numbers and credit card numbers are examples of personal identifiable information that should be protected.
Phishing A malicious attack that uses email, text messaging, and websites to gather sensitive information about people. Example: Be cautious of emails asking for personal information, as they may be phishing attempts.
Plagiarism Using another person's work as your own. Example: Copying and pasting text from a website without proper citation is considered plagiarism.
Private Browsing A way to access websites on the internet without being tracked. Example: I use private browsing mode when searching for sensitive information to prevent it from being tracked.
Proprietary Software that the owner maintains exclusive control over how it is modified and distributed. Example: Microsoft Office is proprietary software owned by Microsoft Corporation.
Public Domain Content that is not owned by any individual or company and that is free to use. Example: Shakespeare's works are in the public domain, so anyone can freely use and distribute them.
RAM Random-access memory (RAM) uses volatile memory to store information as long as the computer has a power source. Example: Adding more RAM to your computer can improve its performance when running multiple programs simultaneously.
Repetitive Stress Injuries Repetitive motions that cause damage to muscles, nerves, and tendons in the body. Example: Typing on the keyboard for long hours can lead to repetitive stress injuries such as carpal tunnel syndrome.
Reply An email response method used to send a response to the original sender. Example: I'll reply to your email as soon as I finish reading it.
Reply All An email response method used to send a response to everyone included in the original message. Example: Be careful not to accidentally click Reply All when responding to an email sent to a large group.
ROM Read-only memory (ROM) is volatile memory that stores information even without power. Example: The BIOS is stored in ROM and is used to boot up the computer when it is powered on.
Router A device used to transmit data packets from one computer network to another. Example:I reset the router to fix the internet connection issues.
Search Engine Software used to search a database using keywords or phrases entered by the user. Example: Google is the most popular search engine used to find information on the internet.
Search Operators Commands and special characters used to refine search engine results. Example: Using quotation marks around a phrase in the search bar narrows down the results, a common search operator.
Session The time a user spends on a website. The time (session) is used to measure that website's traffic. Example: My browsing session timed out after being inactive for too long.
Spyware A malicious software program that spies on the user and shares the information with a third party. Example: Installing an antivirus program can help protect your computer from spyware.
Start Button A button on a Windows operating system desktop that allows users to access computer programs, files, and settings. Example: Click on the Start button to access the programs and settings on your computer.
Synchronous Communication Communication that happens in real time. Example: Video conferencing allows for synchronous communication between team members located in different parts of the world.
Term Definition, describe a thing or to express a concept, Example: The term algorithm refers to a set of rules or instructions for solving a problem.
Toolbar An element on a computer's desktop where buttons, icons, menus, and other elements are placed. Example: I customized my browser's toolbar to include shortcuts to my favorite websites.
Trojan Horse A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, or replicate to other systems. Example: The email attachment turned out to be a Trojan horse disguised as a harmless document.
USB A universal serial bus (USB) is used to connect devices like printers, keyboards, external storage, and digital cameras to computers. Example: I transferred the files from my computer to the USB drive for easy portability.
Video Conference A means of communication using video and audio to speak in real time with others over the internet. Example: We had a video conference with the overseas team to discuss the project status.
Virtual Assistant An application that completes tasks based on the voice commands it is given by a user. Example: I use a virtual assistant app on my phone to set reminders and schedule appointments.
VPN Virtual private network (VPN) is a computer network that can help create a secure connection to the internet. Example: I use a VPN when connecting to public Wi-Fi networks to encrypt my internet traffic and protect my privacy.
Wi-Fi A wireless connection to the internet. Example: I connected my phone to the Wi-Fi network to save on data usage.
Popular Business sets

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards