• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/285

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

285 Cards in this Set

  • Front
  • Back
Create the "look and feel" that visitors will see when they access a site on the world wide web.
Web Site Designers
Use web programming or products to develop web sites, generally for web server applications
Web Application Developer
Are responsible for the overview plan of a web site's development.
Web Architects
An individual who manages a web development team
Web Site Manager
An individual responsible for the maintenance and security of an organizations datbase resources and data.
Database Administrator
Responsible for designing, implementing, managin and maintaing network servers, and associated applications and peripheral devices.
Server Administrator
Individual who focuses on the design, implementation, delivery and support of network components, policies and prcedures used by an organization.
Network Engineers
Individual responsible for managing the security measures used to protect electronic data.
Security Manager
Individual responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy requirements.
Security Analyst/Consultant
The process of improving the volume and quality of traffic to a web site based on the relevance of the site to search terms entered into a search engine.
Search Engine Optimization (SEO)
Responsible for designing, implementing, managin and maintaing network servers, and associated applications and peripheral devices.
Server Administrator
Individual who focuses on the design, implementation, delivery and support of network components, policies and prcedures used by an organization.
Network Engineers
Individual responsible for managing the security measures used to protect electronic data.
Security Manager
Individual responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy requirements.
Security Analyst/Consultant
The process of improving the volume and quality of traffic to a web site based on the relevance of the site to search terms entered into a search engine.
Search Engine Optimization (SEO)
Responsible for performing keyword research to determine the visibility of web sites across multiple clients and search engines.
SEO Analyst
Responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the internet.
Web Marketing Manager
Individual who install, modify and repair personal computer hardware components, such as PCs, disk drives, cd/dvd drives, tape drives, monitors, keyboards, data input devices and other peripheral equipment.
PC Repair Technicians
Someone who diagnose and resolve users technical hardware and software problems.
Help Desk Technician
The study of how a particular part of a company, called a domain, is organized. An ontology is the product of an ontological study.
Ontology
Onology: Represents an entire company or a division within a company.
Domain
Ontology: The bassaaxccxic item in a domain. Also called an instance or an element. For example, a kayak manufacturing company would consider a kayak to be a/an ______________.
Individual/Object
Ontology: A particular type of object.
Class/Set
Ontology: A unique characteristic pertaining to a class. A class can multiple unique attributes.
Attribute
Ontology: Description of how one particular object or class is related to another, usually in a hierarchy. Helps create a taxonomoy, which is a hierarchical relationship between objects and classes.
Relation
Ontology: Hierarchical description and vocabulary concerning a particular domain.
Schema
Data Modeling: Identifying business requirements
Planning and Analysis
Data Modeling: Creating the model as a pure concept.
Conceptual Design
Data Modeling: Encoding the concept into SQL programming
Logical Design
Data Modeling: Determing exactly where data will be stored.
Physical Design
Data Modeling: Applying the design to an active databas application such as MySQL or Oracle.
Implementation
Documents of interest to the internet community published by IETF.
Request for Comments
Technology Adaptation Models: A change from one way of thinking to another; it is a revolutionary transformation that is driven by agents of change.
Paradigm Shift.
Technology Adapation Models: Prediction that the number of transistors per square inch on integrated circuits will double every two years.
Moores's Law
Technology Adaptation Models: Sociological model defines the demographic and psychological characteristics inherent to a population that describes the degree to whih members of that population will adopt or accept a new product or innovation.
- Innovators
- Early Adopters
- Early Majority
- Late Majority
- Laggards
Technology Adoption Life Cycle
Describes how, why and what rate new technologies spread through cultures.
Diffusion of innovation
Develops technical specifications for intellectual, scientific, technological and economical activities worldwide.
International Organization for Standardization (ISO) 9000
Mandates that the most fundamental web technologies be compatiable with one another.
World Wide Web Consortium (W3C)
An open international community of network designers, opeators, vendors and researchers concered with the evolution of the internet architecture and the smooth operation of the internet.
Internet Engineering Task Force (IETF)
Creates standards relating to various technologies incluse those used on the internet. Standards include: Ethernet (802.3), Wireless (802.11)
Institute of Electrical and Electrical Engineers (IEEE)
Cabling Standard
TIA/EIA-568-B
Fiber Optic Standards
TIA/EIA-598
A group of two or more computers connected so they can communicate with one another
Network
Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device to a network; A host.
Node
An individual computer attached to a network. Also a system or application (such as a web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents
Client
A computer ina network that manages the network resource and provides, or serves, information to clients
Server
A group of computer within a confined geographic area.
Local Area Network (LAN)
A group of computer connected over an expansive geographic area that their users can share files and services (2 or more LANs)
Wide Area Network (WAN)
A worldwide network of interconnected networks
Internet
A U.S. Department of Defense agency that created the first global computer network.
Advanced Research Projects Agency (ARPA)
A computer network, funded by ARPA, that served as the baswis for early networking research and was the backbone during of the interenet.
Advanced Research Projects Agency Network (ARPANET)
An independant agency of the US government that promotes the advancement of science and engineering
National Science Foundation (NSF)
The highest level in the computer hierarchy, to which smaller netowrks typically connect.
Backbone
A node on a netowrk that serves as a portal to other networks.
Gateway
A set of software programs that enable users to access resources on the internet via hypertext documents
World Wide Web
Highlighted or underlined text in a web page that, when clicked, links the user to another location or web page.
Hypertext Links
An HTML document containing one or more elements (text, images, hyperlinks) that can be linked to or from other HTML pages.
Web Page
A world wide web server and its content; includes multiple web pages.
Web Site
A software application enables users to access and view web pages on the internet
Web Browser
A suite of protocols that turnsdata into blocks of information called packets, which are then sent across the internet. The standard protocol used by the internet.
Transmission Control Protocol/Internet Protocol (TCP/IP)
Data processed protocols so it can be sent across a network.
Packet
A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANS to form a WAN.
Router
An organization that maintains a gateway to the internet and rents access to customers on a per-use or subscription basis
Internet Service Provider (ISP)
Abbreviation for modulator/demodulator. An analog devices that enables computers to communicate over telephone lines by translating digital data into audio/analog signals (on the sending computer) and then back into digital form (on the receiving computer)
Modem
A comunication standard for sending voice, video or data over digital telephone lines.
Integrated Services Digital Network (ISDN)
The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection. Measured in bites per second.
Bandwidth
A circuit board within a computer's CPU that serves as the interface enabling the computer to a network.
Network Interface Card (NIC)
A device that enables wireless systems to communicate with each other, provided they are the same network
Wireless Access Point
A definition or format that has been approved by a recognized organization
Standard
A high-speed direct internet connection that uses all-digital networks.
Digital Subscriber Line (DSL)
Collectively, the variation of DSL, which include ADSL, RADSL and HDSL.
xDSL
The data transmission standard for the internet. Every computer connected to the internet has its own IP address, which enables a packet of data to be delivered to a specific computer.
Internet Protocol
A base-15 number system that allows alrge number to be displayed by fewer characters than if the number were to be displayed in the regular base-10 system.
Hexidecimal
A protocol that allows a computer to connect to the internet over a phone line.
Point-to-Point Protocol (PPP)
A protocol that implements PPP on top of the Ethernet architecture to connect an entire network to the internet.
Point-to-Point Protocol over Ethernet (PPPoE)
The protocol for transporting HTML documents acress the internet.
Hypertext Transfer Protocol (HTTP)
An internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.
File Transfer Protocol (FTP)
The internet standard protocol for transferring e-mail messages from one computer to another.
Simple Mail Trasnfer Protocol (SMTP)
A protocol that resides in an incoming mail server. The current version is POP3
Post Office Protocol (POP)
A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows shareing of mailboxes and multiple mail server access. The current version is IMAP4
Internet Message Access Protocol (IMAP)
A collection of thousands of internet computers, newsgroups and newsgroup members using Network News Transfer Protocol (NNTP) to exchange information
Usenet (User Network)
On usenet, a subject or other topical interest group whose members exchange ideas and opinions. Participants post and receive messages via a news server
Newsgroup
The internet protocol used by news servers that enables the exchange of newsgroup (Usenet) articles.
Network News Transfer Protocol (NNTP)
A system that maps uniquirely hierarchical names to specific internet addresses.
Domain Name System (DNS)
a computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
host
The complete domain name of an internet computer, such as www.CIW-certified.com.
fully qualified domain name (FQDN)
A server at the highest level of the Domain Name System
Root-level Server
The group into which a domain is categorized , by common topic (company, educational institution) and/or geography (country, state).
top-level domain
A server that resolves domain names into IP addresses.
domain name server
A hosting serve that allows a company to host its domain name on a third-party ISP server
virtual domain
a hosting service that allows multiple entities to share portions of the same domain names.
Shared Domain
A computing paradigm in which users are able to access software and services over the internet instad of from their desktops.
cloud computing
A problem solving model in which a task ordinarily performed by one person is outsourced to a large group or communite in order to obtain and analyze large amounts of data.
crowdsourcing
wireless mode in which systems use only their NICs to connect with each other.
Ad-Hoc Wireless connection
Wireless mode in which systems connect via a centralized point, called a wireless access point.
Infrastructure Wireless Connection
Wireless standard capable of reaching speeds up to 54 megabits per second (Mbps). Often used to connect municipal networks and large campuses.
802.11a
The most common type of wireless network. It usually operates at speeds between 5.5 Mbps and 11 Mbps, although some can read speeds of up to 20 Mbps. Often called the "WiFi" (Wireless Fidelity) networks, and support common Ethernet networks. Operates at 2-GHz range, the same level as common wireless 2-GHz phones and other devies, and are subject to interference.
802.11b
Wireless standard which operates at 54Mpbs. The standard was ratified by the IEEE is 2003 but is becoming less adquate as applications become more complex and require more bandwidth. For example, the use of streaming is difficult because althought they have a theoretical maximum speed of 54 Mbps, real-world speeds are generally in the 22 Mbps to 24 Mbps range ,which is inadquate for video.
802.11g
The most current wireless standard. Compared to previous wireless standards, this enables you to build bigger, faster wireless networks that deliver better reliability and capacity with more built-in security.
802.11n
High-speed data connection capable of transmitting data at 1.544 Mbps.
T1 Line
High-speed data connection capable of speeds of 44.736 Mbps.
T3 Line
The number of channels in a T1 line
24
The number of channels in a T3 line
672
Each channel is capable of supporting __ kilobits per second (Kbps).
64
High-speed data connection capable of transmitting data at 2.048 Mbps (Europe)
E1
High-speed data line capable of transmitting data at 34.368. (Europe)
E3
High-speed data connection capable of 100 gigbits per second (Gbps).
Fiber optic cable
High-Speed data connection capable of 512 Kbps to 52 Mbps.
DSL and xDSL
Advantages to cloud computing
Flexibility, Scalability and Cost reduction
Problems with cloud computing
Connectivity, Speed and Lockout
A tool that assists users of an application in creating documents and/or databases based on styles and templates. Also a tool that guides users step-by-step through a software installation process.
wizard
A standardized method of referring to a resource using a text string.
Uniform Resource Identifier (URI)
A test string that specifies an internet address and the method by which the address can be accessed.
Uniform Resource Locator (URL)
The first web page that displays when you acess a domain.
Home Page
A URL that includes a path past the domain into the folder structure of the web site.
Deep URL
High-speed data connection capable of speeds of 44.736 Mbps.
T3 Line
The number of channels in a T1 line
24
The number of channels in a T3 line
672
Each channel is capable of supporting __ kilobits per second (Kbps).
64
High-speed data connection capable of transmitting data at 2.048 Mbps (Europe)
E1
A URL that gives the full path to the resource.
Absolute URL
A URL that gives an abbreviated path to a resource using the current page as a starting position.
Relative URL
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
Authentication
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
encryption
the process of converting encrypted data back to its original form.
decryption
Used to authenticate dial-up sessions for remote users. Vulnerable to attack because user names and passwords are static and can be dertmined by unauthorized users.
Password Authentication Protocol
authenticates by genrating a challed phrase, which is a randomly generated text string. The challenge phrase is sent to the client requesting a connection, and the client responds with a value created through the use of a one-way hash function. A hash function uses an algorithm to generate a number from a string to textl in this case, from the challenge phrase sent to it by the server. The servers comparess the client response (hash value) with its own calculation of the expected hash values. If the values match, then the client is authenticated and the session proceeds
Challenge Handshake Authentication Protocol (CHAP)
Microsoft's proprietary version of CHAP
MS-CHAP
This device proves the identity of an individual or company over the Web. It is equivalent to an ID card and is digitally signed by the creator.
Digital Certificate
A protocol that provides authentication and encryption, used by most servers for secure exchanges over the internet.
Secure Sockets Layer (SSL)
A protocol basd on provides authentication and encyption, used by most servers for secure exhanges over the internet.
Transport Layer Security (TSL)
The part of the browser responsible for reading the Web page and presenting it to the end user. Has the ability to read, parse and represent HTML, XHTML, XML, images and other tools. Also called the layout engine.
Rendering Engine
The part of the browser responsible for reading and processing programming languages.
Interpreter
A programming method that isolates a particular application or process. Is vital in secure web browsing because it helps the browser keep information from being exposed or miused. Also helps ensure a stable browser.
Sandbox
And instruction from a running application that executes a particular task.
Thread
The screen that contains the web page and the frame or frames you are viewing
Window
A page rendered inside a browser window. Usually one is rendered inside of a window.
Frame
Another instance of a browser window.
Tab
Web page cookies and related data stored locally on the hard drive, unless the browser's privacy mode has been evoked.
Cache
Often called plug-ins, add-ons or helpers application. Includes Adobe Flash, Microsoft Silverlight, and Firefox add-ons.
Supplements
Programming in the browser that stores user names and passwords.
Authentication Information Storage
Applications and certificates stores that enable encryption in the web browser. Most web browsers support various versions of Secure Sockets Layer (SSL) and Transport Layer Security (TLS). SSL version 3.0 and TLS version 1.0 have become standard.
Encryption engine
Code that controls how the browser access a network. Web browsers usually default to allowing a direct connection to the internet. However, you can specify proxy server settings to help your browser communicate with proxy-oriented corporate firewalls.
Network Programming
Settings that determing how the web browser will process downloads.
Downloads Controlls
An application that adds extra capability to your web browser, such as the ability to view movies, run Java applets or see Flash animations. These are easy to install and integrate seamlessly into the main HTML file that you are viewing in your browser window.
Plug-in
A small browser window that appears in front of the browser window you are viewing.
Pop-Up Window
A small browser window that appears behind the browser window you are viewing.
Pop-Under Window
A small text file that contains information sent between a server and a client to help maintain state and track user activities. Can reside in memory or on a hard drive.
Cookie
A project that lacks any constraints imposed by prior development.
greenfield
An internal network based on TCP/IP protocols, accessible only to users within a company. Commonly defined as a private network that implements internet technologies.
Intranet
A network that connects enterprise intranets to the global internet. Designed to provide access to selected external users.
Extranet
An audio and/or video web event that is distributed over the internet.
Webcast
A data format for delivering web content that is updated frequently.
Web feed
An element on a web page that contains data and procedures for how that item will react when activated. On a web page this is typically a multimedia presentation.
Object
Programming concept based on objects and data and how they relate to one another, instead of logic and actions; C++ and Java are types.
Object-Oriented Programming (OOP)
An OOP developed by Sun Microsystems that is fully cross-platform functional
Java
Small programs written in Java, which are downloaded as needed and executed within a web page or browser.
Applets
Always Changing.
dynamic
The characteristic of some hardware and software, such as computers, games and multimedia systems, that allows them to respond differently based on a user's actions.
interactive
reacting to a particular user actions or the browser's completion of a specific task
event-driven
The Netwscape-developed scripting language that was the predecessor to Javascript.
LiveScript
An open set of technologies for integrating components on the internet and within Microsoft applications
ActiveX
Microsoft's version of JavaScript
JScript
Scripting language from Microsoft derived from Visual Basic; used to manipulate ActiveX scripts.
Visual Basic Script (VBScript)
The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A Modified version of BASIC programming language.
Visual Basic
A program installed in the browser to extend its basic functionality. Allows different file formats to be viewed as part of a standard HTML document.
plug-in
Storage space on a computer hard disk used to temporarily store downloaded data.
disk cache
A continuous flow of data, usually audio or video files, that assists with the uninterrupted delivery of those files into a browser.
streaming media
A standard computer interface for creating and playing electronic media. It allows computers to re-create music in digital format for playback.
Musical Instrument Digial INterface (MIDI)
A type of data file compression in which all original data can be recovered when the file is decrompressed.
lossless compression
a type of data file compression in which some file information is permanently eliminated.
lossy compression
a compression/decompression algorithm used by modern video and audio player plug-ins.
Codec
Resizable images that are saved as a sequence of vector statements, which describes a series of points to be connected.
vector graphics.
A plug-in developed by Apple Computer for storing movie and audio files in digital format.
QuickTime
Standard file format by Apply QuickTime; used the .mov, .moov or .qt file name extension
QuickTime Movie (MOV)
A three-dimensional graphic authoring language.
Virtual Reality Modeling Language (VRML)
A scaled-down version of an application; designed to view and print files.
Viewer
A file format that can be transferred across platforms and retain its formatting; designated by the file name extension .pdf
Portable Document Format (PDF)
Standard Windows file format for video files.
Audio Video Interleave (AVI)
High-quality video file compression format.
Moving Picture Experts Group (MPEG)
High-quality audio format developed by Apple Computer
Audio Interchange File Format (AIFF)
Audio file format used by UNIX servers, the majority of web servers. Most web browser can read.
AU
Windows standard format for audio.
Waveform (WAV)
Popular compression standard for audio files; retains most of the sound quality of the source.
MPEG-1 Audio Layer-3 (MP3)
A free, open-source alternative to the MP3 compression format for audio files; creates smaller, faster downloading files.
Ogg Vorbis (.ogg)
A graphical image file format commonly used in HTML documents. Uses lossless compression, but is limited to 256 colors and is used most effectively for drawings and illustrations, rather than for photographs.
Graphics Interchange Format (GIF)
A graphical image file format commonly used for photographs. Uses 16 million colors and uses lossy compression.
Joint Photographic Experts Group (JPEG)
Commonly used graphic file format, developed by Aldus Corporation. Used commonly for medical imaging and desktop publishing. Supports grayscale, 8-bit and 24-bit color, and monochrome formats
Tagged Image File Format (TIFF)
File format used for importing and exporting graphics
Encapsulated PostScripted (EPS)
Portable text file format created by Microsoft that allows image insertion and text formatting; an almost universal format
Rich Text Format (RTF)
A collection of data that can be sorted and searched using search algorithms.
Database
A collection of data about a limited topic, organized into rows and columns in a database.
table
a category of information in a database table.
field
A collection of information in a database table consisting of one or more related fields about a specific entity, such as a person, product or event.
record
a database that contains multiple tables related through common fields
relational database
a field contained in two or more database tables that forms a connection between two tables.
common field
a connection between two or more database tables that is based on a field that the tables have in common
relationship
A field containing a value that uniquely identifies each record in a database table.
primary key
a field in a related database table that refers to the primary keys in the primary table.
foreign key
In databases, a relationship in which each record in table A can have only one matching record in Table B and vice versa
on-to-one relationship
In databases, a relationship in which a record in Table A can have multiple matching records in Table B but a record in table B has only one matching record in Table A.
one-to-many relationship
In databases, a relationship in which one record in Table A can related to may matching records in Table B and vice versa.
many-to-many relationship
a database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many relationship.
junction table
A question posed by a user to a database to request databse information. The database returns the query results based on the criteria supplied by the user in the query.
query
A language used to create an maintain professional, high-performance corporate databases.
Structured Query Language (SQL)
A program used to store, access and manipulate database information
Database Management Systems (DBMS)
A program that processes data submitted by the user. Allows a web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.
Common Gateway Interface (CGI)
A powerful software program that searches internet databases for user-specified information
search engine
A word that appears on a web page and is used by search engines to intify relevant URLs. Some words, such as "the" or "and" are too common to be used.
keyword
A search engine that scans web pages for <meta> tag information
Meta Search engine
A catalog of the contents of a database. Each entry identifies a unique database record.
index
A symbol or ward used in internet searches to narrow search results by including or excluding certain words or phrases from the search criteria
boolean operator
Boolean: Results must include both words
And, &
Boolean: Results must include at least one of the words.
OR, |
Boolean: Results must include the word specified after the operator.
+ (plus sign does not work in advanced search)
Boolean: Results must exclude the word specified after the operator
NOT, !, - (minus sign does not work in advanced search
Boolean: Two keywords on a page must be within certain proximity to each other (near or far)
NEAR, ADJ (adjacent), FAR, BEFORE
Boolean: Keywords must appear in phrases in the order specified.
" "
Boolean: Boolean operator phrases must be performed in the order specified
( ), < >, [ ], { }
Slang term for the standard postal service
Snail Mail
A unique numberical address assigned to a computer or device on a network.
IP Address
A messaging component that routes, delivers and receives email
Message Transfer Agent (MTA)
An email server program that receivbes sent messges and delivers them to their proper destination.
Mail Delivery Agent (MDA)
A unique name or number that identifies you when logging on to a computer system or online service. In an email address, the part before the @ symbol.
User Name
An IP Address represented in words.
Domain Name
An email program that is independent of any sepcific web browser and that can use to send email messages.
email client
A messaging component used as a stand-alone application by the user.
Mail User Agent (MUA)
E-mail programs such as Outlook Express and Opera Mail that come bundled with a web browser and with which they may be integrated
browser email
Free e-mail service froma provider such as Windows Live Hotmail or Yahoo! in which you request a username. You can access your email from any computer that has internet access.
Web-based e-mail
A protocol that enables operating systems to map file name extensions to corresponding applications . Also used by applications to automatically process files downloaded from the internet.
Multipurpose Internet Mail Extension (MIME)
A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.
header
Secure version of MIME that addes encryption to MIME data.
Secure MIME (S/MIME)
A method of encrypting and decrypting email messages. It can also be used to encrypt a digital signature
Pretty Good Privacy (PGP)
An open sourced version of PGP, used for encrupting and decrupting email messages, that does not use patented alogrithms.
GNU Privacy Guard (GPG)
A combination of character that, when read sideways, helps convey emotion in an email message.
emoticon
Unsoliticied and unwanted email messages; the online equivalent of junk mail.
Spam
A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.
CAPTCHA (Complete Automated Public Turling Test to Tell Computers and Humans Apart)
A published list of IP addressed known to be sources of spam.
blackhole list
An e-mail client program that identifies and filters out spam messages before they reach the e-mail inbox.
spam filter
A tool used to schedule appointments an meetings, store contact information and manage tasks
person information management (PIM) program
A small hanheld computer used for personal information mangement
Personal Digital Assistant (PDA)
A standard protocol that wireless devices use to access the internet
Wireless Application Protocol (WAP)
A markup language that presents the text portions of the web pages to wireless devices.
Wireless Markup Language (WML)
A browser technology developed for wireless devices that reformats web pages to display on 176-pixel-wide mobile phone display screens.
Small-Screen Rendering (SSR)
A server that collects and distributes information to an authorized group of participants, called a listserve group.
list server
Users who subscribe to an e-mailing list through a list server
listserve group
The internet standard protocol to remote terminal connection service
Telnet
A protocol and command interface that provides secure access to a remote computer
Secure Shell (SSH)
What is the default TCP port for Telnet
23
What is the default TCP port for SSH?
22
What is default TCP port for FTP?
21
A file containing data or instructions written in zeros and ones (computer language)
binary file
What is the file extension for a basic text file that can be read by any word process or text editor?
.txt
What is the file extension for a WinZip or PKZIP compressed file; a popular form of compressed file for the PC?
.zip
What is the file extension for an executable file; typically a self-extracting compresed file, sometimes found as an exectuable software program?
.exe
What is the file extension for and ASCII text file? ASCII is a universally accepted standard text format for all computers,
.asc
What is the file extension for a UNIX tape archive file; a form of compression used by UNIX operation system?
.tar
What is the file extension for a Macintosh Stuffit self-extacting copmressed file?
.sea
What is the file extension for Macintosh Stuffit compressed file?
.sit
What is the file extension for a platform-neutral compression standard, used by applications such as RAR (for UNIX) and WinRAR (for Windows)?
.rar
a program that allows you to control a computer at a remote location
Virtual Network Computing (VNC)
A network in which each computer has both server and client capabilities
peer-to-peer network
a peer-to-peer network on the internet
P2P
A protocol that allows a network entity to access a directory service listing.
Lightweight Directory Access Protocol (LDAP)
A tool that allows programmers to control different versions of the pieces of a program as those pieces are developed.
Concurrent Versions Systems (CVS)
A development process in which the development phases flow from one to the other sequentially.
Waterfall Model
An iterative software development methodology that uses prototype to help define customer requirements
Rapid Application Development (RAD)
A software development methodology that is designed to be very responsive to the customer's changing requirements.
Extreme Programming (XP)
A software distribution model in which the software is hosted by a service provider and licesed for use by the user.
Software as a Service (SaaS)
A peer-based development process describing organizations and products that provide free source code to the development community at large with the goal of developing better products; includes Apache web server and Linux.
Open Source
a "copyleft" license that removes restrictions on the use and distribution of the licensed product.
open-source license
The collection of statements and instructions written in a human-readable programming language.
source code
The point at which a developer copies source code as it exists, then begins independently developing the code further to produce a distinct piece of software.
project fork
The ability of users to run, copy, distribute, modify and improve the software with no restrictions.
Free distribution
Any software that is based upon one or more existing pieces of software
derived (or derivative) works
The practice of distributing software until two different licensing agreements. Users can then determine the set of terms and conditions under which they will use the software.
Dual licensing
The ability of users to use the software however they see fit (e.g. the software cannot be restricted from use in a certain environment or for a certain purpose)
Non-discrimination
The practice of removing restrictions from the distribution and use of software, and requiring all modified versions of the software to be free as well. A play on the word copyright, which restricts the use of intellectual property.
copyleft
a permissive free software license, which is a license that is similar to a copyleft license but may place restrictions or requirements on derivative works.
BSD License
A free software license that allows the use of source code for open-source as well as proprietary development.
Apache License
A free software license for Mozilla software. Any source code that is copied or modified under the MPL must remain under the MPL
Mozilla Public License (MPL)
A free software license published by IBM. It is similar to the GNU GPL but has a patent clause that prevents developrs from contributing code that infringes on their patents.
Common Public License (CPL)
Software that is the legal property of an entity
porprietary software
a legal contract between the author of software and the end user that defines how the software can be used.
End-User License Agreement (EULA)
a set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention.
patent