• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back

What is Hacking?

It is the practice of using a computer to break into another computer to modify the features of a system through unauthorized access and achieve a goal other than the creator's intended purpose.

What is a thumbnail image?

a small version of an image that is linked to a corresponding full-size image.

What is Wi-Fi piggybacking?

The unauthorized use of an unsecured Wi-Fi network.

What is encryption?

It is a way of temporarily converting data into a (cipher) form which is unreadable until it is decrypted (unscrambled) in order to protect that data from being viewed by unauthorized individuals.

A web development language that uses a combination of HTML, JavaScript, and XML to create fast, interactive web applications is called __________.

AJAX

What is streaming audio?

When a portion of an audio file is downloaded and played while the remainder of the file is still downloading.

Why do companies often not report computer crimes committed against them?

They don't want the bad publicity.

What is secure sockets layer (SSL)?

An encryption technique used by most e-commerce Web sites.

What is a Web page layout?

Illustrates the overall design of a single web page.

What is a cookie file?

A small file stored on the user’s hard drive that contains information about the user.

What is a “throw-away” email address?

A secondary, unused, email address that is provided when filling out online forms.

What is a computer code of conduct?

A set of computer rules that employees must follow or risk disciplinary action.

What is HTML?

Hypertext Markup Language used to create web pages.

What is a Web flowchart?

illustrates the overall design of a Web site.

What is a ruggedized PC?

A very heavy duty PC that can withstand rough/harsh conditions.

What is a Trojan horse?

A harmful program that is disguised as (or within) a legitimate program.

What is a scripting language?

A web development language that is used to create user interactivity and database connectivity to a Web site.

What is a computer virus?

A software program that is designed to cause damage to a computer or perform some other malicious act that alters the way a computer operates, and can replicate itself to infect any new media it has access to.

What is web-authoring software?

It is software that enables a user to visually develop a Web site in a desktop publishing format.

What is Wi-Fi hacking?

Hacking into unsecured wireless networks.

What is XML?

A set of rules for exchanging data over the Web.

What is spam?

Unsolicited, bulk e-mail sent over the Internet.

List three common scripting languages.

AppleScript, JavaScript, VBScript

What is WPA?

Wi-Fi Protected Access - A wireless security technology.

What is a surge suppressor?

A device that protects a computer system from damage due to electrical fluctuations.

What is a firewall?

A security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

What is PERL?

Practical Extraction and Report Language - A popular scripting language used to link form data to a database.

What is a UPS device?

Uninterruptible Power Supply - A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.

What is a disaster recovery plan?

A plan that spells out what the organization will do to prepare for and recover from a disruptive event, such as a fire, natural disaster, terrorist attack, power outage, or computer failure.

What is denial of service attack?

An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function and cause legitimate users to be denied service.

List 3 things that should be included in a disaster recovery plan.

1. Information about who will be in charge immediately after the disaster has occurred.


2. What alternate facilities and equipment can be used.


3. Where the backup media is located.

What is computer monitoring software?

Monitors what the user enters on the keyword.

A web developer needs to consider the characteristics of the system that a person is using to download pages from a web site. What are three characteristics about a user’s system that affects how a web developer creates a web page?

Screen size, internet speed, type of browser, what plug-ins are installed.

List three ways to protect your privacy when using the Internet.

1. Use anti-spyware software.


2. Install firewall software.


3. Use throw-away email addresses.


4. Do not provide personal info on chat rooms or blogs.


5. Do not respond to email requests for personal info.


6. Only download files from known and trusted sources.


7. Only buy from online sites using SSL.