• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/83

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

83 Cards in this Set

  • Front
  • Back

HTTP stands for

HyperText Transfer Protocol
HTTPS stands for
HTTP Secure
URL stands for
Uniform Resource Locator
HTML stands for
HyperText Markup Language
XML stands for
eXtensible Markup Language
XHTML stands for
eXtensible HTML
FTP stands for
File Transfer Protocol
IM stands for
Instant Messaging
B2B stands for
business-to-business

B2C stands for

business-to-consumer
Web pages are usually written in
HTML (or XHTML)
An online equivalent to a diary is referred to as a
blog (short for Web log)
The term used for packaging an audio program, such as a radio show or a lecture, into an MP3 for later download and playback, accompanied by an RSS description and ability to subscribe, is referred to as
podcasting

A(n) _________ problem is one for which an algorithm exists which can give an optimal or near-optimal solution in finite time

structured
A(n) _________ problem is one for which no algorithm exists which can give an optimal or near-optimal solution in finite time (often due to unknowns and variability)
unstructured
A(n) _________ problem is one for which partial solutions may be achieved, but for which variablity and unknowns may still change the expected outcomes.
semi-structured
DSS stands for
decision support systems
ES stands for
expert systems
AI stands for
artificial intelligence
a representation of reality.
model
a step-by-step process for solving a problem.
algorithm
is a computer application that emulates the knowledge of an expert in a narrow field/domain.
expert system
is hardware or software designed to mimic the way a brain works.
neural network?
BI stands for
business intelligence
KM stands for
knowledge management
OLAP stands for
online analytical processing
is the process of selecting, exploring, and modeling large amounts of data to discover previously unknown relationships that can support decision making.
data mining
is a process by which one starts with tables containing broad information and gradually retrieves tables containing more and more detailed information.
drilling down
SDLC stands for
Systems Development Life Cycle
ROI stands for
Return on Investment
TCO stands for
Total Cost of Ownership
DFD stands for
Data Flow Diagram
UML stands for
Unified Modeling Language
is a paragraph the communicates the most important overarching goal of the organization over the next few years.
mission statement
1. based on a mission statement and states what management expects the organization will look like in order to accomplish its mission.
2. Put the follow
vision statement
is the fast development of an application based on initial user requirements and several cycles of user input and developer improvements.
prototyping
is an old system that an organization wants to work with rather than replace (often because they work well even though the technology is old).
legacy system.
s a study of expected costs versus benefits.
cost/benefit analysi
refers to traits common across an organization, such as a willingness to share information or hide knowledge.
organizational culture.
the old and new systems are kept running together until the new system is proven to work. This is expensive, but safe.
parallel conversion
ASP stands for
Application Service Provider
SLA stands for
Service Level Agreement

ERP stands for

Enterprise Resource Planning
RFI stands for
Request for Information
RFP stands for
Request for Proposal
UCITA stands for
Uniform Computer Information Transactions Act
is comparing one system's performance with another, using a set of non-system-specific criteria. Benchmarking tests should be run under a range of typical usage conditions, including extreme system load.
Benchmarking
UPS stands for
Uninterruptible Power Supply
SSL stands for
Secure Socket Layer
DoS stands for
Denial of Service
DDoS stands for
Distributed Denial of Service
is the time during which resources are unavailable.
Downtime
is a reduction in voltage, which can be much more dangerous for electronics than a blackout.
brownout
is a loss of power.
blackout
is when humans deliberately damage or destroy resources just because they want to.
vandalism
a secure version of HTTP
What is HTTPS?
is using human weaknesses to gain access to confidential information
Social engineering
is intercepting keystrokes and either storing them or sending them someplace on the Internet (very useful for stealing usernames, passwords, account information, etc.).
Keystroke logging
Hardware or software which secretly records keystrokes.
keylogger.
is done by sending fraudulent messages (typically emails) which lure recipients into going to a fake website to try to get them to enter confidential information.
phishing
is similar to phishing, but the attack takes place using a fraudulent phone call directing the person to call a malicious number where personal information will be gathered.
vishing.
is replacing a real website with an imposter to try to get people to enter confidential information.
pharming.
is a host on the network designed to expect attacks and respond very slowly, allowing the attacker to not get much done and spend enough time on the machine to be tracked.
tarpit.
is a host on the network designed to lure attackers in so waiting monitors can attempt to track the attacker.
honeypot
is a piece of data which is extremely unlikely to be accessed legitimately, but which an attacker is likely to access; it has special monitoring to immediately alert system administrators when it is accessed with information about where the access request originated
A honeytoken
is software designed to spread from one computer to another based on something a user does, such as open a fil
virus
is software that can spread itself through a network without human intervention.
worm
is a malicious program disguised as a potentially helpful or useful program; the program may even appear to be carrying out useful tasks while the malicious part of the code silently carries out its tasks or waits for the right time to spring into action. Trojans horses are a form of virus.
A Trojan horse
is a program where malicious code lies dormant waiting for a specific time or set of conditions to become active and cause damage.
logic bomb.
is a machine which has been attacked and has been infected with malicious software which awaits commands to carry out DDoS attacks. The user is usually unaware of the problem.
zombie.
is taking control of a computer or website without the owners consent (generally remotely). Zombies are hijacked computers.
hijacking
is a transaction that is guaranteed to not be only partially recorded. It is either completely recorded or dropped. Atomic transactions are generally made up from a group of transactions.
atomic transaction.
is a recorded series of details which log transactions, times, and the people involved. An audit trail can be used to find out where errors or abuses happened. This helps deter abuses.
audit trail
is hardware and/or software that blocks unauthorized access to a system by blocking unrequested incoming messages and blocking outgoing messages that the computer should not be generating.
firewall
is a machine that represents all the machines within a network to the external world. This helps focus where security and other control measures are most important.
A proxy server
is translating a message into an unreadable form for all but the recipient (and possibly the sender).
Encryption
is translating a message from unreadable ciphertext back into its original plaintext message.
Decryption
is a message before it is encrypted (or after it is decrypted).
Plaintext
is a message which has been encrypted.
Ciphertext is
is when the encryption key and decryption key are the same.
Symmetric encryption
is when the encryption key and decryption key are different. Each participant has a public and a private key. Someone can encrypt a message using the recipient's public key, which only the recipient can decrypt using their private key.
Asymmetric encryption
is a synonym for symmetric encryption. Symmetric encryption is when the encryption key and decryption key are the same.
Private key encryption
is a synonym for asymmetric encryption. Asymmetric encryption is when the encryption key and decryption key are different. Each participant has a public and a private key. Someone can encrypt a message using the recipient's public key, which only the recipient can decrypt using their private key.
Public key encryption