digitally created environment to inspire learning and creativity
primary focus is measuring student learning
an example of digital age tool
International society in technology education (abbr.)
an example of emerging technology today
goal of technology-enriched technology is to enable students to become ____ participants
authentic learning experiences are ___ to students
ethical use of digital information includes _____ your sources
promote and model digital citizenship and ____
engage in professional growth and ____
Lets certain things into the cell that needs in but keeps other things out.
Contains all the qorking parts of the cell, the organelles.
Where proteins are made.
Has our DNA that contains all our genetic information.
Controls whats going in and out of the nucleus.
Is a series of folded membrane pathways spotted with ribosomes.
Has no ribosomes on it.
Makes new proteins and new membranes.
Are made up of saccules that package up things to be transported around the cell.
Are vesicles that have digestive enzymes inside them that break down the things that the cells dont need.
Are large membranous sacs for storing things
Have a double membrane that folds in on itself forming little finger-like projections.
A content filtering and ad blocking extension for the Google Chrome, Apple Safari (desktop and mobile), Opera and Microsoft Edge web browsers. AdBlock allows users to prevent page elements, such as advertisements, from being displayed.
A way to overlay something on top of aa.com to block users from moving forward with a transaction. We have used Akamai redirect to block the home page when we had pricing issues, such as a $0.00 fare, to prevent customers from purchasing.
Short for "application," which is the same thing as a software program. While an app may refer to a program for any hardware platform, it is most often used to describe programs for mobile devices, such as smartphones and tablets.
A program that runs on a computer for viewing internet pages.
Temporary internet files stored on your computer.
Text or image on a web page that asks a customer to do something. There will be a link when selected that goes to another page where the action to take is located.
Files used to track activity or pre-populate information when you visit a site again.
Transferring a file from a website to your computer.
A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Your computer’s storage device.
The physical parts of a computer and all related devices.
The communication procedure used by web browsers and web servers to transfer files.
Hypertext Transfer Protocol Secure. The same thing as HTTP, but uses a secure socket layer (SSL) for security purposes
A unique number given when you connect to the internet.
Internet Service Provider - the company you use to purchase your internet access.
The user name and password you use to sign into an account.
A search engines that searches other search engines. A meta search engine submits your query to several other search engines and returns a summary of the results. In the aa.com technical support world, this is a travel website such as Kayak, Skyscanner, FareCompare, TripAdvisor, Trivago and Hipmunk.
A network hardware device that is connected to a computer to connect it to the internet or other networks. This is typically in the form of a small box that you get from your provider.
Software used to operate your computer.
The attempt to obtain sensitive information. Typically carried out by a malicious email that directs users to enter personal information at a fake website whose look and feel are similar to a legitimate one.
type of window that opens without the user selecting "New Window" from a program's File menu.
The central processing unit.
The computer’s virtual memory, a workspace used to handle short-term tasks.
To restart your computer
A host that delivers web pages to your computer.
Outline, or map, of the pages needed for a website.
Lines of computer code written by programmers that tell the computer what to do. Also known as a program or an application.
Slang name for unsolicited commercial email/junk mail.
How fast your internet connection transmits and displays pages.
A term for transferring software or other files from your computer to another computer.
Also known as a web address.
Means people with disabilities are able to use the website.
Computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones
Receiving data, such as a music or video file, from a server or another computer system.
A computer device that reads, writes, and stores digital data.
A vast global computer network, which links smaller computer networks together.
Any data or information in a computer.
A computer program used to display information, normally in the form of a slide show
Another term for the CPU of a computer—the central processing unit that runs computer programs.
The process of designing, writing, testing, debugging, and maintaining the source code of computer programs.
A computer application that simulates a paper accounting worksheet
Sending data, such as a music or video file, from a local computer system to another computer system or server.
Electronic mail sent between computer networks.
The opening page of a website.
A computer language used to create web pages.
A file format for compressing pictures
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen.
The ability to use technology to find, organize, and evaluate information.
A group of networked computers that share a common address (.edu, .com).
The process of converting data into code.
A security system that protects a network.
A way to narrow search results by using the operators AND, OR, & NOT.
A temporary storage place for quick retrieval of frequently used data.
A small text file stored in a computer’s hard drive by a website.
An organized collection of information that is searchable.
To practice appropriate and responsible behavior when using technology
The text field in a web browser where an URL is displayed or typed.
The amount of data that can be sent through a connection at one time.
To save the URL of a webpage for easy access in the future.
Instructions you input for a computer to follow.
The action of writing CODE or instructions for the computer to follow.
An unit of memory (8 binary digits represent a character).
Central Processing Unit- The brain of the computer.
A program that searches for items in a database or sites on the WWW.
Uniform Resource Locator- The address of a resource on the WWW.
A program used to navigate the WWW.
The global system of interconnected computer networks that link billions of devices.
A set of computers connected together for the purpose of sharing resources.
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web.
is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills
a computer designed for use by one person at a time.
is the collection of physical parts of a computer system.
is a generic term for organized collections of computer data and instructions
one of the most essential parts of a computer system.
A central processing unit
refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.
The primary computer storage device, which spins, reads and writes one or more fixed disk platters.
Short for digital versatile disc or digital video disc
a device or program that enables a computer to transmit data over
a widely used sans-serif typeface developed in 1957 by Swiss typeface designer Max Miedinger
Universal Serial Bus
The global communication network that allows almost all computers worldwide to connect and exchange information.
providing a common topic identifier in text and chat messages so they can be searched as a group. Commonly used in tweets
connects to the motherboard of a computer system and generates output images to display.
What makes virtual reality?
You feel this while in Virtual Reality
Virtual reality does this
It simulates a virtual _________
In Virtual Reality you look at a ________
In Virtual Reality you are put in a _____________ world
You usually use a __________ to experience virtual reality
You use _____ to experience VR
You use________ to also experience VR
is any part of your computer that has physical structure, such as the keyboard and mouse
is an electronic device that manipulates information, or data
is any set of instructions that tells the hardware what to do and how to do it.
are designed to be placed on a desk, and they're typically made up of a few different parts
are battery-powered computers that are more portable than desktops, allowing you to use them almost anywhere
are handheld computers that are even more portable than laptops
is a computer that serves up information to other computers on a network
is the metal and plastic box that contains the main components of the computer, including the motherboard,etc.
lies flat on a desk, and the monitor usually sits on top of it
is tall and sits next to the monitor or on the floor
works with a video card, located inside the computer case, to display images and text on the screen
is one of the main ways to communicate with a computer
key allows you to stop a function or action
keys are designed to work in combination with other keys.
is another important tool for communicating with computers
is the computer's main circuit board
is located inside the computer case on the motherboard
is measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second
WHAT DOES RAM STAND FOR?
is where your software, documents, and other files are stored
What you should do to your anti-virus software on a regular basis
What you should do to all papers with PII or other sensitive information
Where you should keep your badge when off-site
An adversary is considered a _________
"Computer1234" would be a bad example of this
Actions that mitigate a threat
An option to protect your credit
What potential harm from poor OPSEC is called
What you must do to emails containing Critical Information
What a weakness in our practices or defenses is called
The type of information that OPSEC protects
The number of steps in the OPSEC process
The Freedom of Information Act is for what type of information
It is very important to use privacy settings on _______________
What you should remove each time you walk away from your NMCI computer
What you cannot take with your smartphone or camera anywhere onsite
What you should practice whenever you discuss your work with anyone
OPSEC is a _______ effort
What is the abbreviation of the list that shows the commands Critical Information
The kind of email account you can't use to conduct Government business
SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of...
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen.
________ _________ and alerts can help to prevent mail theft.
________ all unnecessary paperwork. DO NOT throw it in the garbage can.
Do not leave wallets and purses in your _____.
To protect yourself from online theft, use ________ internet sites.
If you become a victim of fraud, file a police report with your ______ jurisdiction.
To protect members from Identity Theft, talk to them about _________ _______ of fraud.
Protect member's information by ___________ ID.
Be cautious with use of your ____.
A thief can use your identity by using your _______ card and/or ATM card to drain your funds.
A thief can use your identity to create ___________ ________ made with your account information on them.
A thief may ______ benefits under your name.
To help protect yourself, ______ your credit report yearly.
To prevent theft, do not write important ___________ down and keep it in an easily accessible.
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards.
______ ______ is when a person obtains and uses your personal information without your permission for financial gain.
America First strives to keep its ________ safe by informing them of possible risks.
If you obtain a stolen ID from a fraudulent member, do not give the ID ______.
Always follow __________ procedures.