Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/226

Click to flip

226 Cards in this Set

  • Front
  • Back
Internet
A worldwide collection of networks that links millions of businesses, governments agencies, educational institutions and individuals.
Advanced research projects agency (ARPA)
An agency of the U.S. Department of Defense that built the first internet.
Goal of ARPANET
Allow scientists at different locations to share information and work together. Also, They could function even if a part of the network was destroyed by a disaster.
Host (Server)
Any computer that provides services and connections to other computers on a network.
Internet Traffic
The communications activity on the Internet.
World Wide Web Consortium
Oversees research and sets standards and guildines for many areas of the Internet.
Dial-up access
The computer's modem uses a standard telephone line to connect to the Internet.
Cable Modem
A device that allowss access to high-speed Internet services through the cable television network
Fixed Wireless
High-speed internet connection using a dish shaped antenna to communicate with a tower via radio signals.
Satellite Modem
A device that communicates with a satellite dish to provide high-speed Internet connections via satellite.
Access provider
A business that provides individuals and companies access to the internet free or for a fee.
ISP (Internet Service Provider)
A regional or national access provider.
Regional ISP
Provides Internet Access to a specific geographic area.
Internet Traffic
The communications activity on the Internet.
World Wide Web Consortium
Oversees research and sets standards and guildines for many areas of the Internet.
DSL (digital subscriber line)
Technology that provides high speed Internet connections using regular copper telephone lines
Online service provider
A company that provides online Internet access.
Point of presence
A telephone number that you dial to that connects you to an access point on the Internet.
Wireless Internet service provider
It company that provides wireless Internet access to computers with wireless modems or access devices or two Internet enabled mobile devices were computers in
Internet backbone
The major carriers of network traffic.
IP address, Internet protocol address
A number that uniquely identifies each computer or device connected to the Internet
Domain name
The text version of an IP address
Domain name system
The method that the Internet uses to store domain names and their corresponding IP addresses
Domain name system server
Translates the domain name and its associated IP address so data can be routed to the correct computer
World Wide Web
Consists of a worldwide collection of electronic documents.
Web page
Each electronic document on the Web
Web site
A collection of related web pages and associated items, such as documents and pictures, stored on a web server
Web server
A computer that delivers requested web pages to your computer
Web browser
Application software that allows users to access and view web pages. Example: Internet Explorer, Netscape, Mozilla, Opera, and Safari.
Home page
Refers to the first page to a web site displays.
Microbrowser
A special type of browser, which is designed for Internet enabled mobile devices and thier small screens.
Downloading
The process of a computer receiving information, such as a web page, from a server on the Internet.
URL (uniform resource locator) or Web address
A web page is unique address.
Link or hyperlink
It built in connection to other related web pages or as part of a web page
Downloading
The process of a computer receiving information, such as a web page, from a server on the Internet.
Portal
Of portal is a web site that offers a variety of Internet services from his single, convenient location
Web community
A web site that joins a specific group of people with similar interests or relationships
Wireless portal
The portal design for Internet enabled mobile devices
news web site
Contains newsworthy materials including stories and articles relating to current events, life, money, and sports
Informational web site
A web site that contains factual information
Business/marketing web site
A web site the promotes or sells products and services
Educational
A web site that offers exciting, challenging avenues for formal and informal teaching and learning
Blog
An informal web site consisting of time stamped articles oppose in the dire journal formats, usually listed in reverse chronological order
wiki
A collaborative web site that you allows users to add to, modify, or delete the web site content via their web browser
Content aggregator
A business that gathers and organizes Web content, and then distributes, or feeds, the content to subscribers for free or for a fee.
Guidelines for evaluating the value of a web site
Affiliation, audience, authority, content, currency, design, and objectivity of a website
Multimedia
Any application that combines text with graphics, animation, audio, video, and or virtual reality
JPEG
A format that compresses graphics to reduce their file size
Graphic
It is a representation of nontext information such as a drawing, chart, or photograph
Thumbnail
A small version of the larger graphic
Animation
The appearance of motion created by displaying a series of still images in sequence on the web site
Audio
A web site that allows you to listen to music speech or any of us out
MP3
An audio file format that reduces the audio files to about 1/10 of its original size, while preserving much of the original quality of the sound
Streaming
The process of transferring data in a continuous and even flow
Internet video
Consists of full-motion images that a playback at various speeds. Most are accompanied by all of
Virtual reality
The use of computers to simulate a real or imagined environment that appears as a three dimensional space
Plug in
A program that extends the capability of a browser
Web publishing
The development and maintenance of web pages
E-commerce
A business transaction that occurs over the an electronic networks such as the Internet
Business to consumer e-commerce
Consists of the sale of products and services to the general public by business.
Electronic storefront
A web page that contains product descriptions, graphics, and a shopping cart, used in e-commerce.\
Consumer to consumer e-commerce
Commerce that occurs when one consumer cells directly to another
E-mail
The transmission of messages and files via a computer network
E-mail program
A program allows a user to create, send, receive, Fort, store, print, and delete e-mail messages
E-mail address
The combination of a username and domain name that identifies a user so he or she can receive Internet e-mail
Username
A unique combination of characters, such as letters of the alphabet, and/or numbers, that identifies a specific user
Address book
An electronic list containing names and e-mail addresses
FTP (file transfer protocol)
On Internet standard that permits file uploading and downloading with other computers on the Internet
Uploading
The process of transferring documents, graphics, and other objects from your computer to a server on the internet
Newsgroup
An online area in which users have written discussions about a particular subject
Username
A unique combination of characters, such as letters of the alphabet, and/or numbers, that identifies a specific user
Mailing list
A group of e-mail names and addresses given a single name. When a message is sent to mailing lists, every person on the list receives a copy of the message
Chat
Real-time typed conversation that takes place on a computer
Chat room
A location on an Internet server that permits users to chat with each other
Instant messaging
A real-time Internet can indication services that notifies you were in one or more people are online and then allows you to exchange messages or files or join a private chat room with them
Internet telephony
Enables users to speak to others over the Internet using their desktop computer, mobile computer, or mobile device
Netiquette
The code of acceptable behaviors, users should follow while on the Internet.
Database
A collection of data organized in a matter that allows access, retrieval, and use of the data
Data
Texts, numbers, images, audio, and video
Information
Processed data that is organized, meaningful, and useful
Database software or database management system
DBMS users create a computerized database; add, change, and delete data in the database; sort and retrieve data from the database; and create forms and reports from the data in the database
Data integrity
The concept that identifies the quality of data
Characters
A single byte, that represents a number, letter, punctuation mark, or other simple.
Field
A combination of one or more to related characters or bites and is the smallest unit of data a user accesses
Field name
The unique name that identifies each field
Field size
The maximum number of characters that the field can contain
Datatype
Specifies a kind of data at field can contain and how the field is used. (Text, numeric, currency, date, etc.)
Record
A group of related fields
Key field or primary key
It feel that uniquely identifies each record and a file
Data file
A collection of related records stored on a storage medium such as a hard disk, CD, or DVD
File maintenance
The procedures that keep data current. Example adding records, changing records, or deleting records
Reasons to change a record
Reason one: to correct inaccurate data. Reason to: to update old data with new data.
Validation
The process of comparing data with a set of rules or values to find out if the data is correct
Alphabetic/numeric check
Alphabetic check insures that users enter only alphabetic data into a field
Range check
A validity check that determines whether a number is within a specified range.
Consistency check
A validity check the test the data in two or more associated feels to ensure that the relationship is logical
Completeness check
The validity check that verifies that required field contains data
Check digit
A validity check that checks the number of or character that is appended to or inserted in a primary key value
File processing system
A system in which each organization or area within an organization has its own set of files
Data redundancy
Each department or area, the company has his own files thus some same fields are stored in multiple places
Database approach
Many programs and users share the data in the database
Front end
A program that generally has a more user-friendly interface than the DBMS
Data dictionary
Contains data about each file in the database and each field in those files
Query
A request for specific data for the database
Query language
A language that consists of simple, English like statements that allow users to specify the data to display, print, or store in a query
Query by example (QBE)
A feature that has a graphical user interface to assist users with the retrieving data through a query
Form, data entry form
A window on the screen that provides areas for entry or changing data in the database
Report generator, report writer
A function of a database allows users to design a report on the screen, retrieve data into the report design, and the display or print of the report
Access privileges
Establishing who can enter new data, change existing data, delete unwanted data, and view data
A DBMS log
A listing of activities that change the contents of the database used to re-create the past events of a database
Recovery utility
A program that uses the logs and/or backups to restore a database when it becomes damaged or destroyed
Data model
A model that consists of rules and standards that define how the database organizes data
Relational database
A database that stores data in tables that consists of rows and columns. Each row has a primary key and each column has a unique name
A relationship
A connection with in the data
Structured query language
A query language that allows users to manage, update, and retrieve data
Object oriented database
A database that stores data in objects.
An object (database)
An item that contains data, as well as the actions that read or process the data
multimedia databases
a dmbs that stores images, audio, and/or video clips.
Groupware database
The data is that stores document such as schedules, calendars, manuals, memos, and reports
Computer aided design database
A database that stores data about engineering, architectural, and scientific designs
Hypertext database
A database that contains text links to other types of documents
Web database
A database that links to an E. form on a web page
Multidimensional database
A database that stores data in dimensions. Where is the relational database is a two-dimensional table, a multidimensional database can store more than two dimensions of data
Data warehouse
A huge database of stores that manages the data required to analyze historical and current transactions
Data mining
A process that is used to find patterns and relationships among data
Database server
A computer that stores and provides access to the database
Database analyst
A person that focuses on the meaning and usage of date. Less technical.
Database administrator
A person that requires more technical inside view of the data. The database administrator at creates and maintains a data dictionary, maintain security of the database, monitors the performance of the database, and checks backup and recovery procedures.
Computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer crime
Any illegal act involving a computer generally is referred to as a:
Hacker
Refers to someone who acts as is a computer or network illegally
Cracker
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions
Script kiddie
Has the same intent is a cracker, but does not have the technical skills and knowledge
Cyberextortionist
Someone who uses e-mail as a vehicle for extortion
Cyber terrorist
Someone who uses the Internet or network to destroy or damage computers for political reasons
Virus
A potentially damaging computer program that affects or infects the computer negatively by altering the way the computer works without the user's knowledge or permission
Worm
A program that copies itself repeatedly, for example in memory or on a network, using of resources and possibly shutting down the computer or network
Trojan horse
A program that hides within or looks like a legitimate program
Payload
The destructive event or crank the program is intended to deliver.
Trusted source
A company or person you believe will not send a virus infected file knowingly
Macro
Instruction saved in an application such as a word processing or spreadsheet for
Antivirus program
A program that protects a computer against viruses of identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Virus signature
In on specific pattern of virus code
To inoculated against a virus
The antivirus program records information such as the file size and five creation date in a separate inoculation file antivirus program that uses them permission to Detective a virus tempers with the data described in the inoculated program file
Quarantine
A separate area of a hard disk that holds the infected file until the infection can be removed
Virus hoax
An e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. Often these viruses are in a form of a trend letter that request a user to send a copy of the e-mail to as many people as possible.
Denial of service attack
An assault that's purpose is to obstruct computer access to an Internet service such as the Web or e-mail
Zombie
A computer that is completely unaware it is being used as part of a network that attakcs other systems
Back door
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
Spoofing
Technique intruders used to make their in network or Internet transmission appear legitimate to a victim computer or network
Firewall
Hardware and/or software that protects a networked resources from intrusion by users on another network such as the Internet
Proxy server
A server outside the company's network that controls, which communications pass into the company's network
Personal firewall
A utility that detects and protects a personal computer and its data from unauthorized intrusions
Honeypots
A vulnerable computer that is set up to entice an intruder to break into it.
Unauthorized access
The use of the computer and network without permission
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities
Audit trail
Records that file, both successful and on accessible attempts to access a computer network
Possessed object
Any item that you must carry to gain access to a computer or computer facility
Personal identification number or PIN
In numeric password, either assigned by company or selected by user
Biometric device
A device that authenticate the person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is then compared with the code stored in the computer verifying a physical or behavioral characteristic.
Hardware theft
The act of stealing computer equipment
Hardware vandalism
The act of defacing or destroying computer equipment
Software theft
A theft that occurs when someone steal softerware, intentionally erases programs, or illegally copies a program
License agreement
The right to use the software
Product activation
Users revive a product certified character identification number to receive an installation identification number unique to the computer on which the software is installed
Information theft
Occurs when someone steals personal or confidential information
Encryption
A process of converting readable data into unreadable characters to prevent unauthorized access
Plaintext
Unencrypted readable data
Digital signature
Unencrypted code that a person, web site come or company attaches to an electronic message to verify the identity of the message sender
Digital certificate
A notice that guarantees a user or web site is legitimate
Secure site
A web site that uses encryption techniques to secure its data.
Secure sockets layer
A buffer that provides encryption of all data that passes attorney-client and an Internet server.
Virtual private network
(VPN) a standard Internet connection provided to mobile users.
System failure
The prolonged malfunction of a computer. System failure can also cause of loss of hardware, software, data, or information
Noise
Any unwanted signal, usually very quickly, that is mixed with the normal voltage entering the computer
Undervoltage
A phenomenon that occurs when the electrical supply a drops
Overvoltage
A phenomenon that occurs when the incoming or power increases significantly above the normal hundred and 20 V
Surge protector
A device that uses special electrical components to smooth out minor noise, provide a stable current for, and keep in overvoltage from reaching the computer and electronic equipment
Uninterrupted power supply
A device that contain surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
A fault tolerant computer
A computer that has duplicate components, so it can continue to operate when one of its main components fail
Backup
It duplicates other file, program, or dusk that can be used as the original is lost, damaged, or destroyed
Three generation backup policy
A policy that preserves three copies of important files
War driving
Individuals attempt to detect wireless networks veer their notebook computer while driving a vehicle through an area they suspect has a wireless network.
Computer ethics
The moral guidelines are governed the use of computers and information systems
Intellectual property rights
The rights to which creators are entitled for their work
Copyright
A guarantee that gives authors and artists exclusive rights to duplicate, publish, and so the materials.
Code of conduct
A written guideline that helps determine whether a specific computer action is apical or unethical
Information privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Cookie
A small text file that a web server stores under computer, which usually has information about you and your viewing preferences.
Spyware
A program placed on a computer without the user's knowledge that secretly collects information about the user
Adware
A program that displays an online advertisement in a batter or pop-up window
Spam
An unsolicited e-mail message or newsgroup postings and too many recipients or newsgroups at once
E-mail filtering
A service that blocks e-mail messages from designated sources
Anti-spam program
A program that attempt to remove spam before reaches your inbox
Pfishing
A scam in which of arbitrators scented official looking e-mail message that attempts to obtain your personal and financial information
pfarming
A scam, similar to fishing, where perpetrator attempt to obtain your personal and financial information except they do so via spoofing
Social engineering
Defined as gaining off unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naïveté of others
Employee monitoring
Monitoring that involves the use of computers to observe, record, and review and employees use of computer, including three occasions such as e-mail messages keyboard activity and web sites visited.
Content filtering
The process of restricting access to certain material on the Web.
Computer forensics
The discovery, collection, an analysis of evidence found in computers and networks
Web filtering software
A program that restricts access to specific web sites
Repetitive strain injury
And injury or disorder of the muscles, tendons, nerves, commitments, and joints caused by repetitive strain
Ergonomics
And applied science devoted to incorporating comfort come efficiency, and safety into the design of items in the workplace
Computer addiction
An addiction occurs when the computer consumes someone's entire social life
Green computing
Computer use of them balls reducing electricity and environmental waste while using a computer.
IT department
Information technology department. Responsible for meeting the information requirements of their organization at a responsible for keeping all the computer operations at networks running smoothly
Computer equipment field
Field that consists of manufacturers and distributors of computers and computer related hardware such as disk and tape drives, monitors, printers, and communcations and networking devices
Computer software field
They feel that consists of companies that develop, manufacture, and supporter wide range of software
Computer service and repair field
A field that provides preventative maintenance, component installation, and repair services to customers
Computer salespeople
Salesman who must possess a general understanding of computers and a specific knowledge of the products they are selling
IT consultant
A person typically hired based a computer expertise, who provides computer services to his or her clients
Trade school
A technical or vocational school, which offers programs primarily of areas of programming, web design and development, graphics design, fiber maintenance, networking, personal computers work, and security.
Computer information systems degree
Curriculum teaches students. Technical knowledge and skills and focuses on how to apply these skills in the workplace
Computer science or software engineering
The degree on the theory of programming and operating systems
Computer engineering
A degree that teaches students such designed to devote the electronic components onto computers and peripheral devices
Association for computing machinery
A scientific and educational organization dedicated to advancing knowledge and proficiency of information technology
Association of information technology professionals
A professional organization, with nearly 9000 members consisting of programmers, system analysts, and information processing managers
User group
A collection of people with common computer equipment or software interest that meet regularly to share information
Certification
A program that verifies the technical knowledge of the individual who has demonstrated competence in a particular area.
sponsoring organization
A software vendor that develops and administers the examinations to determine whether a person is qualified for certification.
Benefits of certification
Customers gain confidence in a company if IT people are certified. Businesses gain more productive workers. Industry gains a sort of self-regulation.
Types of Certification classes
Self-study, Online training classes, Instructer-led training, web resources, used for pertification prep.
Self-study certification class
Flexible programs that help professionals prepare for certification on thier own time.
Online Training certification classes
Allows self-study prep for certification online.
Instructor-led training certifcation classes
A class or seminar, boot camp, or academic style classes that prepare for certification tests using an instructor
Hardware certification
Wide to narrow scope of knowledge needed for this certification. Can be from repairing a certain type of hardware, to an integrated hardware solution.