!
Instructions: Students will use the online textbook find at least 3-5 important points about each of the terms.
!
Objective: To become familiar with the following content for personal enrichment and text preparation.
!
!
!
1. Encryptiona. Converting text into an unreadable series of numbers and letters
b. Digital encryption software can scrabble and unscramble data
c. These prevent outsiders from getting the information
2. Identity thefta. Stealing someone’s information for illegal purposes
b. It is easy for these people to be invisible to you
c. The issue applies to anyone who uses the Internet to register, purchase or use email or texts
3. Malwarea. Designed to damage computer or steal information
b. Covers any software installed on a computer with out the owners consent
c. Mal- ware includes products such as spyware, Trojan horses, adware, and rootkits. 4. Ergonomicsa. The best way to design workplace for safety and productivity
b. Raise awareness of you body parts of how to use the computer to maintain a safe and healthy workplace.
c. Use of correct posture, and finding ways to pre- vent computer related injuries.
!
!
5. Cyber Predatora. Cyber predators who hunt for victims are dangerous to everyone.
b. Not everyone is as they appear on line
c. A person who uses the Internet to make contact with others in order to harm them 6. Repetitive stress injurya. Muscle or joint injury that results from performing actions repeatedly.
b. Everyone who works at a computer is at risk for developing a form of RSI called carpal tunnel syndrome (CTS)
c. results from repeated use of a particular part of the body
!
!
!
!
7. Naming conventiona. A set of rules used in the naming of files and folders.
b. Choose a name that clearly identifies the contents of the file.
c. if sharing use your initials or name.
!
8. Phishinga. A social engineering activity where the perpetrator uses