Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
226 Cards in this Set
- Front
- Back
Internet
|
A worldwide collection of networks that links millions of businesses, governments agencies, educational institutions and individuals.
|
|
Advanced research projects agency (ARPA)
|
An agency of the U.S. Department of Defense that built the first internet.
|
|
Goal of ARPANET
|
Allow scientists at different locations to share information and work together. Also, They could function even if a part of the network was destroyed by a disaster.
|
|
Host (Server)
|
Any computer that provides services and connections to other computers on a network.
|
|
Internet Traffic
|
The communications activity on the Internet.
|
|
World Wide Web Consortium
|
Oversees research and sets standards and guildines for many areas of the Internet.
|
|
Dial-up access
|
The computer's modem uses a standard telephone line to connect to the Internet.
|
|
Cable Modem
|
A device that allowss access to high-speed Internet services through the cable television network
|
|
Fixed Wireless
|
High-speed internet connection using a dish shaped antenna to communicate with a tower via radio signals.
|
|
Satellite Modem
|
A device that communicates with a satellite dish to provide high-speed Internet connections via satellite.
|
|
Access provider
|
A business that provides individuals and companies access to the internet free or for a fee.
|
|
ISP (Internet Service Provider)
|
A regional or national access provider.
|
|
Regional ISP
|
Provides Internet Access to a specific geographic area.
|
|
Internet Traffic
|
The communications activity on the Internet.
|
|
World Wide Web Consortium
|
Oversees research and sets standards and guildines for many areas of the Internet.
|
|
DSL (digital subscriber line)
|
Technology that provides high speed Internet connections using regular copper telephone lines
|
|
Online service provider
|
A company that provides online Internet access.
|
|
Point of presence
|
A telephone number that you dial to that connects you to an access point on the Internet.
|
|
Wireless Internet service provider
|
It company that provides wireless Internet access to computers with wireless modems or access devices or two Internet enabled mobile devices were computers in
|
|
Internet backbone
|
The major carriers of network traffic.
|
|
IP address, Internet protocol address
|
A number that uniquely identifies each computer or device connected to the Internet
|
|
Domain name
|
The text version of an IP address
|
|
Domain name system
|
The method that the Internet uses to store domain names and their corresponding IP addresses
|
|
Domain name system server
|
Translates the domain name and its associated IP address so data can be routed to the correct computer
|
|
World Wide Web
|
Consists of a worldwide collection of electronic documents.
|
|
Web page
|
Each electronic document on the Web
|
|
Web site
|
A collection of related web pages and associated items, such as documents and pictures, stored on a web server
|
|
Web server
|
A computer that delivers requested web pages to your computer
|
|
Web browser
|
Application software that allows users to access and view web pages. Example: Internet Explorer, Netscape, Mozilla, Opera, and Safari.
|
|
Home page
|
Refers to the first page to a web site displays.
|
|
Microbrowser
|
A special type of browser, which is designed for Internet enabled mobile devices and thier small screens.
|
|
Downloading
|
The process of a computer receiving information, such as a web page, from a server on the Internet.
|
|
URL (uniform resource locator) or Web address
|
A web page is unique address.
|
|
Link or hyperlink
|
It built in connection to other related web pages or as part of a web page
|
|
Downloading
|
The process of a computer receiving information, such as a web page, from a server on the Internet.
|
|
Portal
|
Of portal is a web site that offers a variety of Internet services from his single, convenient location
|
|
Web community
|
A web site that joins a specific group of people with similar interests or relationships
|
|
Wireless portal
|
The portal design for Internet enabled mobile devices
|
|
news web site
|
Contains newsworthy materials including stories and articles relating to current events, life, money, and sports
|
|
Informational web site
|
A web site that contains factual information
|
|
Business/marketing web site
|
A web site the promotes or sells products and services
|
|
Educational
|
A web site that offers exciting, challenging avenues for formal and informal teaching and learning
|
|
Blog
|
An informal web site consisting of time stamped articles oppose in the dire journal formats, usually listed in reverse chronological order
|
|
wiki
|
A collaborative web site that you allows users to add to, modify, or delete the web site content via their web browser
|
|
Content aggregator
|
A business that gathers and organizes Web content, and then distributes, or feeds, the content to subscribers for free or for a fee.
|
|
Guidelines for evaluating the value of a web site
|
Affiliation, audience, authority, content, currency, design, and objectivity of a website
|
|
Multimedia
|
Any application that combines text with graphics, animation, audio, video, and or virtual reality
|
|
JPEG
|
A format that compresses graphics to reduce their file size
|
|
Graphic
|
It is a representation of nontext information such as a drawing, chart, or photograph
|
|
Thumbnail
|
A small version of the larger graphic
|
|
Animation
|
The appearance of motion created by displaying a series of still images in sequence on the web site
|
|
Audio
|
A web site that allows you to listen to music speech or any of us out
|
|
MP3
|
An audio file format that reduces the audio files to about 1/10 of its original size, while preserving much of the original quality of the sound
|
|
Streaming
|
The process of transferring data in a continuous and even flow
|
|
Internet video
|
Consists of full-motion images that a playback at various speeds. Most are accompanied by all of
|
|
Virtual reality
|
The use of computers to simulate a real or imagined environment that appears as a three dimensional space
|
|
Plug in
|
A program that extends the capability of a browser
|
|
Web publishing
|
The development and maintenance of web pages
|
|
E-commerce
|
A business transaction that occurs over the an electronic networks such as the Internet
|
|
Business to consumer e-commerce
|
Consists of the sale of products and services to the general public by business.
|
|
Electronic storefront
|
A web page that contains product descriptions, graphics, and a shopping cart, used in e-commerce.\
|
|
Consumer to consumer e-commerce
|
Commerce that occurs when one consumer cells directly to another
|
|
E-mail
|
The transmission of messages and files via a computer network
|
|
E-mail program
|
A program allows a user to create, send, receive, Fort, store, print, and delete e-mail messages
|
|
E-mail address
|
The combination of a username and domain name that identifies a user so he or she can receive Internet e-mail
|
|
Username
|
A unique combination of characters, such as letters of the alphabet, and/or numbers, that identifies a specific user
|
|
Address book
|
An electronic list containing names and e-mail addresses
|
|
FTP (file transfer protocol)
|
On Internet standard that permits file uploading and downloading with other computers on the Internet
|
|
Uploading
|
The process of transferring documents, graphics, and other objects from your computer to a server on the internet
|
|
Newsgroup
|
An online area in which users have written discussions about a particular subject
|
|
Username
|
A unique combination of characters, such as letters of the alphabet, and/or numbers, that identifies a specific user
|
|
Mailing list
|
A group of e-mail names and addresses given a single name. When a message is sent to mailing lists, every person on the list receives a copy of the message
|
|
Chat
|
Real-time typed conversation that takes place on a computer
|
|
Chat room
|
A location on an Internet server that permits users to chat with each other
|
|
Instant messaging
|
A real-time Internet can indication services that notifies you were in one or more people are online and then allows you to exchange messages or files or join a private chat room with them
|
|
Internet telephony
|
Enables users to speak to others over the Internet using their desktop computer, mobile computer, or mobile device
|
|
Netiquette
|
The code of acceptable behaviors, users should follow while on the Internet.
|
|
Database
|
A collection of data organized in a matter that allows access, retrieval, and use of the data
|
|
Data
|
Texts, numbers, images, audio, and video
|
|
Information
|
Processed data that is organized, meaningful, and useful
|
|
Database software or database management system
|
DBMS users create a computerized database; add, change, and delete data in the database; sort and retrieve data from the database; and create forms and reports from the data in the database
|
|
Data integrity
|
The concept that identifies the quality of data
|
|
Characters
|
A single byte, that represents a number, letter, punctuation mark, or other simple.
|
|
Field
|
A combination of one or more to related characters or bites and is the smallest unit of data a user accesses
|
|
Field name
|
The unique name that identifies each field
|
|
Field size
|
The maximum number of characters that the field can contain
|
|
Datatype
|
Specifies a kind of data at field can contain and how the field is used. (Text, numeric, currency, date, etc.)
|
|
Record
|
A group of related fields
|
|
Key field or primary key
|
It feel that uniquely identifies each record and a file
|
|
Data file
|
A collection of related records stored on a storage medium such as a hard disk, CD, or DVD
|
|
File maintenance
|
The procedures that keep data current. Example adding records, changing records, or deleting records
|
|
Reasons to change a record
|
Reason one: to correct inaccurate data. Reason to: to update old data with new data.
|
|
Validation
|
The process of comparing data with a set of rules or values to find out if the data is correct
|
|
Alphabetic/numeric check
|
Alphabetic check insures that users enter only alphabetic data into a field
|
|
Range check
|
A validity check that determines whether a number is within a specified range.
|
|
Consistency check
|
A validity check the test the data in two or more associated feels to ensure that the relationship is logical
|
|
Completeness check
|
The validity check that verifies that required field contains data
|
|
Check digit
|
A validity check that checks the number of or character that is appended to or inserted in a primary key value
|
|
File processing system
|
A system in which each organization or area within an organization has its own set of files
|
|
Data redundancy
|
Each department or area, the company has his own files thus some same fields are stored in multiple places
|
|
Database approach
|
Many programs and users share the data in the database
|
|
Front end
|
A program that generally has a more user-friendly interface than the DBMS
|
|
Data dictionary
|
Contains data about each file in the database and each field in those files
|
|
Query
|
A request for specific data for the database
|
|
Query language
|
A language that consists of simple, English like statements that allow users to specify the data to display, print, or store in a query
|
|
Query by example (QBE)
|
A feature that has a graphical user interface to assist users with the retrieving data through a query
|
|
Form, data entry form
|
A window on the screen that provides areas for entry or changing data in the database
|
|
Report generator, report writer
|
A function of a database allows users to design a report on the screen, retrieve data into the report design, and the display or print of the report
|
|
Access privileges
|
Establishing who can enter new data, change existing data, delete unwanted data, and view data
|
|
A DBMS log
|
A listing of activities that change the contents of the database used to re-create the past events of a database
|
|
Recovery utility
|
A program that uses the logs and/or backups to restore a database when it becomes damaged or destroyed
|
|
Data model
|
A model that consists of rules and standards that define how the database organizes data
|
|
Relational database
|
A database that stores data in tables that consists of rows and columns. Each row has a primary key and each column has a unique name
|
|
A relationship
|
A connection with in the data
|
|
Structured query language
|
A query language that allows users to manage, update, and retrieve data
|
|
Object oriented database
|
A database that stores data in objects.
|
|
An object (database)
|
An item that contains data, as well as the actions that read or process the data
|
|
multimedia databases
|
a dmbs that stores images, audio, and/or video clips.
|
|
Groupware database
|
The data is that stores document such as schedules, calendars, manuals, memos, and reports
|
|
Computer aided design database
|
A database that stores data about engineering, architectural, and scientific designs
|
|
Hypertext database
|
A database that contains text links to other types of documents
|
|
Web database
|
A database that links to an E. form on a web page
|
|
Multidimensional database
|
A database that stores data in dimensions. Where is the relational database is a two-dimensional table, a multidimensional database can store more than two dimensions of data
|
|
Data warehouse
|
A huge database of stores that manages the data required to analyze historical and current transactions
|
|
Data mining
|
A process that is used to find patterns and relationships among data
|
|
Database server
|
A computer that stores and provides access to the database
|
|
Database analyst
|
A person that focuses on the meaning and usage of date. Less technical.
|
|
Database administrator
|
A person that requires more technical inside view of the data. The database administrator at creates and maintains a data dictionary, maintain security of the database, monitors the performance of the database, and checks backup and recovery procedures.
|
|
Computer security risk
|
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
|
|
Computer crime
|
Any illegal act involving a computer generally is referred to as a:
|
|
Hacker
|
Refers to someone who acts as is a computer or network illegally
|
|
Cracker
|
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions
|
|
Script kiddie
|
Has the same intent is a cracker, but does not have the technical skills and knowledge
|
|
Cyberextortionist
|
Someone who uses e-mail as a vehicle for extortion
|
|
Cyber terrorist
|
Someone who uses the Internet or network to destroy or damage computers for political reasons
|
|
Virus
|
A potentially damaging computer program that affects or infects the computer negatively by altering the way the computer works without the user's knowledge or permission
|
|
Worm
|
A program that copies itself repeatedly, for example in memory or on a network, using of resources and possibly shutting down the computer or network
|
|
Trojan horse
|
A program that hides within or looks like a legitimate program
|
|
Payload
|
The destructive event or crank the program is intended to deliver.
|
|
Trusted source
|
A company or person you believe will not send a virus infected file knowingly
|
|
Macro
|
Instruction saved in an application such as a word processing or spreadsheet for
|
|
Antivirus program
|
A program that protects a computer against viruses of identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
|
|
Virus signature
|
In on specific pattern of virus code
|
|
To inoculated against a virus
|
The antivirus program records information such as the file size and five creation date in a separate inoculation file antivirus program that uses them permission to Detective a virus tempers with the data described in the inoculated program file
|
|
Quarantine
|
A separate area of a hard disk that holds the infected file until the infection can be removed
|
|
Virus hoax
|
An e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. Often these viruses are in a form of a trend letter that request a user to send a copy of the e-mail to as many people as possible.
|
|
Denial of service attack
|
An assault that's purpose is to obstruct computer access to an Internet service such as the Web or e-mail
|
|
Zombie
|
A computer that is completely unaware it is being used as part of a network that attakcs other systems
|
|
Back door
|
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
|
|
Spoofing
|
Technique intruders used to make their in network or Internet transmission appear legitimate to a victim computer or network
|
|
Firewall
|
Hardware and/or software that protects a networked resources from intrusion by users on another network such as the Internet
|
|
Proxy server
|
A server outside the company's network that controls, which communications pass into the company's network
|
|
Personal firewall
|
A utility that detects and protects a personal computer and its data from unauthorized intrusions
|
|
Honeypots
|
A vulnerable computer that is set up to entice an intruder to break into it.
|
|
Unauthorized access
|
The use of the computer and network without permission
|
|
Unauthorized use
|
The use of a computer or its data for unapproved or possibly illegal activities
|
|
Audit trail
|
Records that file, both successful and on accessible attempts to access a computer network
|
|
Possessed object
|
Any item that you must carry to gain access to a computer or computer facility
|
|
Personal identification number or PIN
|
In numeric password, either assigned by company or selected by user
|
|
Biometric device
|
A device that authenticate the person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is then compared with the code stored in the computer verifying a physical or behavioral characteristic.
|
|
Hardware theft
|
The act of stealing computer equipment
|
|
Hardware vandalism
|
The act of defacing or destroying computer equipment
|
|
Software theft
|
A theft that occurs when someone steal softerware, intentionally erases programs, or illegally copies a program
|
|
License agreement
|
The right to use the software
|
|
Product activation
|
Users revive a product certified character identification number to receive an installation identification number unique to the computer on which the software is installed
|
|
Information theft
|
Occurs when someone steals personal or confidential information
|
|
Encryption
|
A process of converting readable data into unreadable characters to prevent unauthorized access
|
|
Plaintext
|
Unencrypted readable data
|
|
Digital signature
|
Unencrypted code that a person, web site come or company attaches to an electronic message to verify the identity of the message sender
|
|
Digital certificate
|
A notice that guarantees a user or web site is legitimate
|
|
Secure site
|
A web site that uses encryption techniques to secure its data.
|
|
Secure sockets layer
|
A buffer that provides encryption of all data that passes attorney-client and an Internet server.
|
|
Virtual private network
|
(VPN) a standard Internet connection provided to mobile users.
|
|
System failure
|
The prolonged malfunction of a computer. System failure can also cause of loss of hardware, software, data, or information
|
|
Noise
|
Any unwanted signal, usually very quickly, that is mixed with the normal voltage entering the computer
|
|
Undervoltage
|
A phenomenon that occurs when the electrical supply a drops
|
|
Overvoltage
|
A phenomenon that occurs when the incoming or power increases significantly above the normal hundred and 20 V
|
|
Surge protector
|
A device that uses special electrical components to smooth out minor noise, provide a stable current for, and keep in overvoltage from reaching the computer and electronic equipment
|
|
Uninterrupted power supply
|
A device that contain surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
|
|
A fault tolerant computer
|
A computer that has duplicate components, so it can continue to operate when one of its main components fail
|
|
Backup
|
It duplicates other file, program, or dusk that can be used as the original is lost, damaged, or destroyed
|
|
Three generation backup policy
|
A policy that preserves three copies of important files
|
|
War driving
|
Individuals attempt to detect wireless networks veer their notebook computer while driving a vehicle through an area they suspect has a wireless network.
|
|
Computer ethics
|
The moral guidelines are governed the use of computers and information systems
|
|
Intellectual property rights
|
The rights to which creators are entitled for their work
|
|
Copyright
|
A guarantee that gives authors and artists exclusive rights to duplicate, publish, and so the materials.
|
|
Code of conduct
|
A written guideline that helps determine whether a specific computer action is apical or unethical
|
|
Information privacy
|
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
|
|
Cookie
|
A small text file that a web server stores under computer, which usually has information about you and your viewing preferences.
|
|
Spyware
|
A program placed on a computer without the user's knowledge that secretly collects information about the user
|
|
Adware
|
A program that displays an online advertisement in a batter or pop-up window
|
|
Spam
|
An unsolicited e-mail message or newsgroup postings and too many recipients or newsgroups at once
|
|
E-mail filtering
|
A service that blocks e-mail messages from designated sources
|
|
Anti-spam program
|
A program that attempt to remove spam before reaches your inbox
|
|
Pfishing
|
A scam in which of arbitrators scented official looking e-mail message that attempts to obtain your personal and financial information
|
|
pfarming
|
A scam, similar to fishing, where perpetrator attempt to obtain your personal and financial information except they do so via spoofing
|
|
Social engineering
|
Defined as gaining off unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naïveté of others
|
|
Employee monitoring
|
Monitoring that involves the use of computers to observe, record, and review and employees use of computer, including three occasions such as e-mail messages keyboard activity and web sites visited.
|
|
Content filtering
|
The process of restricting access to certain material on the Web.
|
|
Computer forensics
|
The discovery, collection, an analysis of evidence found in computers and networks
|
|
Web filtering software
|
A program that restricts access to specific web sites
|
|
Repetitive strain injury
|
And injury or disorder of the muscles, tendons, nerves, commitments, and joints caused by repetitive strain
|
|
Ergonomics
|
And applied science devoted to incorporating comfort come efficiency, and safety into the design of items in the workplace
|
|
Computer addiction
|
An addiction occurs when the computer consumes someone's entire social life
|
|
Green computing
|
Computer use of them balls reducing electricity and environmental waste while using a computer.
|
|
IT department
|
Information technology department. Responsible for meeting the information requirements of their organization at a responsible for keeping all the computer operations at networks running smoothly
|
|
Computer equipment field
|
Field that consists of manufacturers and distributors of computers and computer related hardware such as disk and tape drives, monitors, printers, and communcations and networking devices
|
|
Computer software field
|
They feel that consists of companies that develop, manufacture, and supporter wide range of software
|
|
Computer service and repair field
|
A field that provides preventative maintenance, component installation, and repair services to customers
|
|
Computer salespeople
|
Salesman who must possess a general understanding of computers and a specific knowledge of the products they are selling
|
|
IT consultant
|
A person typically hired based a computer expertise, who provides computer services to his or her clients
|
|
Trade school
|
A technical or vocational school, which offers programs primarily of areas of programming, web design and development, graphics design, fiber maintenance, networking, personal computers work, and security.
|
|
Computer information systems degree
|
Curriculum teaches students. Technical knowledge and skills and focuses on how to apply these skills in the workplace
|
|
Computer science or software engineering
|
The degree on the theory of programming and operating systems
|
|
Computer engineering
|
A degree that teaches students such designed to devote the electronic components onto computers and peripheral devices
|
|
Association for computing machinery
|
A scientific and educational organization dedicated to advancing knowledge and proficiency of information technology
|
|
Association of information technology professionals
|
A professional organization, with nearly 9000 members consisting of programmers, system analysts, and information processing managers
|
|
User group
|
A collection of people with common computer equipment or software interest that meet regularly to share information
|
|
Certification
|
A program that verifies the technical knowledge of the individual who has demonstrated competence in a particular area.
|
|
sponsoring organization
|
A software vendor that develops and administers the examinations to determine whether a person is qualified for certification.
|
|
Benefits of certification
|
Customers gain confidence in a company if IT people are certified. Businesses gain more productive workers. Industry gains a sort of self-regulation.
|
|
Types of Certification classes
|
Self-study, Online training classes, Instructer-led training, web resources, used for pertification prep.
|
|
Self-study certification class
|
Flexible programs that help professionals prepare for certification on thier own time.
|
|
Online Training certification classes
|
Allows self-study prep for certification online.
|
|
Instructor-led training certifcation classes
|
A class or seminar, boot camp, or academic style classes that prepare for certification tests using an instructor
|
|
Hardware certification
|
Wide to narrow scope of knowledge needed for this certification. Can be from repairing a certain type of hardware, to an integrated hardware solution.
|