Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
blog
|
an abreviated version of therm 'WED LOG" a journal maintained by an indivual or a gropu of people for public and commected
|
|
boolen logic
|
way to serqach database; consists of three elogic operators- AND, NOT, OR
|
|
copryright
|
the exclusive right, granted by law for acerttain number of years, to make and dispose of literary, musical, or artistic work
|
|
directories
|
a container for files and other directories
|
|
feed
|
the desigh of typeface
|
|
indexes
|
a web site organized by categories
|
|
keyboards
|
common input device for entering numeric and alphabetic data into a computer
|
|
libel
|
text that states something untrue about someone else or a company
|
|
link lists
|
collections of links on a particular topic
|
|
math symbols
|
used in a formula that filters out unwanted listings
|
|
news feed
|
a data format used to providing users with frequently updated content
|
|
peer-to-peer (p2p)
|
computer architecture in which oall of the computer on network are equal and there is no computer designated as the server
|
|
phrase seraching
|
searching ffor words that apper next to each other
|
|
plagiarism
|
claiming someone else's words as your own
|
|
podcather
|
a program that ckeeks a feed for new content on a regualr basis, and the download the podcast to your specific device
|
|
public domain
|
information or content to which copyright protection does not apply and that is available for anyone to copy
|
|
related search
|
preprogrammed queries or questions suggested by search engine
|
|
search engine
|
tools that allow you to enter a keyword to find sites on the internet that contain information you need
|
|
shared bookmark
|
a form of collaborative information sharing that lets users organize and sahre favorites, or bookmarks
|
|
social networking sites
|
an outline community that provides interractiojn for groups of people who sahre a similar interest or activity
|
|
trademark
|
similar to a copyright, but relates specifically to visual or commercial images
|
|
wiki
|
a collaborative web site that can be edited by anyone with access
|
|
wildcard character
|
the arterisk(8) abd question mark(?) chracters used to represent unknown cahracters in a serach for filenames words or phrases
|
|
Business to business (B2B)
|
e-commerce transactions between business sucha as between a company and a computer
|
|
Business to consumer (B2C)
|
e-commerce transactions between business, such as between a company and a computer
|
|
Business to government (B2G)
|
online transictions between business and consumers
|
|
Critical thinking
|
sthe process of evaluatiing propositions or hypotheses and making judgments
|
|
Digital cash
|
allows someone to pay by transmitting a number from one computer to another
|
|
Electronic commerce (e commerce)
|
business conducted over the internet
|
|
Keyless entry system
|
a system in which to open a lock, you press a buttom on a remote control device or enter a combination on the ketpad
|
|
Online learning
|
classes and other educatuional opportunities provided on the internet
|
|
Telecommuting
|
electronic transfer data
|
|
browser hijacking
|
a program or practice that takes control of your browser without your knowledge
|
|
brute force attacks
|
an attack that uses a script or program to log on to an account using hindreds of words or phrases stored in a dictionary file.
|
|
hacking
|
invading someones elses computer
|
|
hardware firewall
|
a device that controls computers from one point
|
|
keylogger
|
a malicious program that records keystrokes
|
|
private key
|
the partof encryption process that deciphers an encoded certificate
|
|
public key
|
the part of encryption process that encodes a certificate
|
|
repetitve strain injury
|
an injury that can result when a person makes too many of the same motions over a long period of time
|
|
secure sockets layer
|
a protocol for managing the security of messaging transmissions on the internet
|
|
sniffer
|
a program that hackers use to capture ids and passwords on a network
|
|
spyware
|
software installed surreptitiously on a personal computer with the goal of collecting information about the users the users borwsing habits and other personal information
|
|
strong password
|
a password that is complex and secure it contains numbers, letters, and speciasl characters that do not include personal information such as a name birth of date . in addition to this strong passwords contain at least eight characters and at least one letter number and one character
|
|
transport layer security
|
a protocol for managing the security of message transmissions on the internet
|