Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
83 Cards in this Set
- Front
- Back
HTTP stands for |
HyperText Transfer Protocol
|
|
HTTPS stands for
|
HTTP Secure
|
|
URL stands for
|
Uniform Resource Locator
|
|
HTML stands for
|
HyperText Markup Language
|
|
XML stands for
|
eXtensible Markup Language
|
|
XHTML stands for
|
eXtensible HTML
|
|
FTP stands for
|
File Transfer Protocol
|
|
IM stands for
|
Instant Messaging
|
|
B2B stands for
|
business-to-business
|
|
B2C stands for |
business-to-consumer
|
|
Web pages are usually written in
|
HTML (or XHTML)
|
|
An online equivalent to a diary is referred to as a
|
blog (short for Web log)
|
|
The term used for packaging an audio program, such as a radio show or a lecture, into an MP3 for later download and playback, accompanied by an RSS description and ability to subscribe, is referred to as
|
podcasting
|
|
A(n) _________ problem is one for which an algorithm exists which can give an optimal or near-optimal solution in finite time |
structured
|
|
A(n) _________ problem is one for which no algorithm exists which can give an optimal or near-optimal solution in finite time (often due to unknowns and variability)
|
unstructured
|
|
A(n) _________ problem is one for which partial solutions may be achieved, but for which variablity and unknowns may still change the expected outcomes.
|
semi-structured
|
|
DSS stands for
|
decision support systems
|
|
ES stands for
|
expert systems
|
|
AI stands for
|
artificial intelligence
|
|
a representation of reality.
|
model
|
|
a step-by-step process for solving a problem.
|
algorithm
|
|
is a computer application that emulates the knowledge of an expert in a narrow field/domain.
|
expert system
|
|
is hardware or software designed to mimic the way a brain works.
|
neural network?
|
|
BI stands for
|
business intelligence
|
|
KM stands for
|
knowledge management
|
|
OLAP stands for
|
online analytical processing
|
|
is the process of selecting, exploring, and modeling large amounts of data to discover previously unknown relationships that can support decision making.
|
data mining
|
|
is a process by which one starts with tables containing broad information and gradually retrieves tables containing more and more detailed information.
|
drilling down
|
|
SDLC stands for
|
Systems Development Life Cycle
|
|
ROI stands for
|
Return on Investment
|
|
TCO stands for
|
Total Cost of Ownership
|
|
DFD stands for
|
Data Flow Diagram
|
|
UML stands for
|
Unified Modeling Language
|
|
is a paragraph the communicates the most important overarching goal of the organization over the next few years.
|
mission statement
|
|
1. based on a mission statement and states what management expects the organization will look like in order to accomplish its mission.
2. Put the follow |
vision statement
|
|
is the fast development of an application based on initial user requirements and several cycles of user input and developer improvements.
|
prototyping
|
|
is an old system that an organization wants to work with rather than replace (often because they work well even though the technology is old).
|
legacy system.
|
|
s a study of expected costs versus benefits.
|
cost/benefit analysi
|
|
refers to traits common across an organization, such as a willingness to share information or hide knowledge.
|
organizational culture.
|
|
the old and new systems are kept running together until the new system is proven to work. This is expensive, but safe.
|
parallel conversion
|
|
ASP stands for
|
Application Service Provider
|
|
SLA stands for
|
Service Level Agreement
|
|
ERP stands for |
Enterprise Resource Planning
|
|
RFI stands for
|
Request for Information
|
|
RFP stands for
|
Request for Proposal
|
|
UCITA stands for
|
Uniform Computer Information Transactions Act
|
|
is comparing one system's performance with another, using a set of non-system-specific criteria. Benchmarking tests should be run under a range of typical usage conditions, including extreme system load.
|
Benchmarking
|
|
UPS stands for
|
Uninterruptible Power Supply
|
|
SSL stands for
|
Secure Socket Layer
|
|
DoS stands for
|
Denial of Service
|
|
DDoS stands for
|
Distributed Denial of Service
|
|
is the time during which resources are unavailable.
|
Downtime
|
|
is a reduction in voltage, which can be much more dangerous for electronics than a blackout.
|
brownout
|
|
is a loss of power.
|
blackout
|
|
is when humans deliberately damage or destroy resources just because they want to.
|
vandalism
|
|
a secure version of HTTP
|
What is HTTPS?
|
|
is using human weaknesses to gain access to confidential information
|
Social engineering
|
|
is intercepting keystrokes and either storing them or sending them someplace on the Internet (very useful for stealing usernames, passwords, account information, etc.).
|
Keystroke logging
|
|
Hardware or software which secretly records keystrokes.
|
keylogger.
|
|
is done by sending fraudulent messages (typically emails) which lure recipients into going to a fake website to try to get them to enter confidential information.
|
phishing
|
|
is similar to phishing, but the attack takes place using a fraudulent phone call directing the person to call a malicious number where personal information will be gathered.
|
vishing.
|
|
is replacing a real website with an imposter to try to get people to enter confidential information.
|
pharming.
|
|
is a host on the network designed to expect attacks and respond very slowly, allowing the attacker to not get much done and spend enough time on the machine to be tracked.
|
tarpit.
|
|
is a host on the network designed to lure attackers in so waiting monitors can attempt to track the attacker.
|
honeypot
|
|
is a piece of data which is extremely unlikely to be accessed legitimately, but which an attacker is likely to access; it has special monitoring to immediately alert system administrators when it is accessed with information about where the access request originated
|
A honeytoken
|
|
is software designed to spread from one computer to another based on something a user does, such as open a fil
|
virus
|
|
is software that can spread itself through a network without human intervention.
|
worm
|
|
is a malicious program disguised as a potentially helpful or useful program; the program may even appear to be carrying out useful tasks while the malicious part of the code silently carries out its tasks or waits for the right time to spring into action. Trojans horses are a form of virus.
|
A Trojan horse
|
|
is a program where malicious code lies dormant waiting for a specific time or set of conditions to become active and cause damage.
|
logic bomb.
|
|
is a machine which has been attacked and has been infected with malicious software which awaits commands to carry out DDoS attacks. The user is usually unaware of the problem.
|
zombie.
|
|
is taking control of a computer or website without the owners consent (generally remotely). Zombies are hijacked computers.
|
hijacking
|
|
is a transaction that is guaranteed to not be only partially recorded. It is either completely recorded or dropped. Atomic transactions are generally made up from a group of transactions.
|
atomic transaction.
|
|
is a recorded series of details which log transactions, times, and the people involved. An audit trail can be used to find out where errors or abuses happened. This helps deter abuses.
|
audit trail
|
|
is hardware and/or software that blocks unauthorized access to a system by blocking unrequested incoming messages and blocking outgoing messages that the computer should not be generating.
|
firewall
|
|
is a machine that represents all the machines within a network to the external world. This helps focus where security and other control measures are most important.
|
A proxy server
|
|
is translating a message into an unreadable form for all but the recipient (and possibly the sender).
|
Encryption
|
|
is translating a message from unreadable ciphertext back into its original plaintext message.
|
Decryption
|
|
is a message before it is encrypted (or after it is decrypted).
|
Plaintext
|
|
is a message which has been encrypted.
|
Ciphertext is
|
|
is when the encryption key and decryption key are the same.
|
Symmetric encryption
|
|
is when the encryption key and decryption key are different. Each participant has a public and a private key. Someone can encrypt a message using the recipient's public key, which only the recipient can decrypt using their private key.
|
Asymmetric encryption
|
|
is a synonym for symmetric encryption. Symmetric encryption is when the encryption key and decryption key are the same.
|
Private key encryption
|
|
is a synonym for asymmetric encryption. Asymmetric encryption is when the encryption key and decryption key are different. Each participant has a public and a private key. Someone can encrypt a message using the recipient's public key, which only the recipient can decrypt using their private key.
|
Public key encryption
|