• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back
blog
an abreviated version of therm 'WED LOG" a journal maintained by an indivual or a gropu of people for public and commected
boolen logic
way to serqach database; consists of three elogic operators- AND, NOT, OR
copryright
the exclusive right, granted by law for acerttain number of years, to make and dispose of literary, musical, or artistic work
directories
a container for files and other directories
feed
the desigh of typeface
indexes
a web site organized by categories
keyboards
common input device for entering numeric and alphabetic data into a computer
libel
text that states something untrue about someone else or a company
link lists
collections of links on a particular topic
math symbols
used in a formula that filters out unwanted listings
news feed
a data format used to providing users with frequently updated content
peer-to-peer (p2p)
computer architecture in which oall of the computer on network are equal and there is no computer designated as the server
phrase seraching
searching ffor words that apper next to each other
plagiarism
claiming someone else's words as your own
podcather
a program that ckeeks a feed for new content on a regualr basis, and the download the podcast to your specific device
public domain
information or content to which copyright protection does not apply and that is available for anyone to copy
related search
preprogrammed queries or questions suggested by search engine
search engine
tools that allow you to enter a keyword to find sites on the internet that contain information you need
shared bookmark
a form of collaborative information sharing that lets users organize and sahre favorites, or bookmarks
social networking sites
an outline community that provides interractiojn for groups of people who sahre a similar interest or activity
trademark
similar to a copyright, but relates specifically to visual or commercial images
wiki
a collaborative web site that can be edited by anyone with access
wildcard character
the arterisk(8) abd question mark(?) chracters used to represent unknown cahracters in a serach for filenames words or phrases
Business to business (B2B)
e-commerce transactions between business sucha as between a company and a computer
Business to consumer (B2C)
e-commerce transactions between business, such as between a company and a computer
Business to government (B2G)
online transictions between business and consumers
Critical thinking
sthe process of evaluatiing propositions or hypotheses and making judgments
Digital cash
allows someone to pay by transmitting a number from one computer to another
Electronic commerce (e commerce)
business conducted over the internet
Keyless entry system
a system in which to open a lock, you press a buttom on a remote control device or enter a combination on the ketpad
Online learning
classes and other educatuional opportunities provided on the internet
Telecommuting
electronic transfer data
browser hijacking
a program or practice that takes control of your browser without your knowledge
brute force attacks
an attack that uses a script or program to log on to an account using hindreds of words or phrases stored in a dictionary file.
hacking
invading someones elses computer
hardware firewall
a device that controls computers from one point
keylogger
a malicious program that records keystrokes
private key
the partof encryption process that deciphers an encoded certificate
public key
the part of encryption process that encodes a certificate
repetitve strain injury
an injury that can result when a person makes too many of the same motions over a long period of time
secure sockets layer
a protocol for managing the security of messaging transmissions on the internet
sniffer
a program that hackers use to capture ids and passwords on a network
spyware
software installed surreptitiously on a personal computer with the goal of collecting information about the users the users borwsing habits and other personal information
strong password
a password that is complex and secure it contains numbers, letters, and speciasl characters that do not include personal information such as a name birth of date . in addition to this strong passwords contain at least eight characters and at least one letter number and one character
transport layer security
a protocol for managing the security of message transmissions on the internet