Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
161 Cards in this Set
- Front
- Back
ARPANET |
a predecessor to the internet, this government-funded network connected four U.S universities in 1969. |
|
protocols |
a set of rules or standards that must be followed by computers that wish to communicate over a network. |
|
TCP/IP |
protocols at the heart of internet communcation |
|
IP address |
a unique set of numbers and/or letters that uniquely identifies every computer or device on the internet. |
|
CSNET |
an early computer network created in 1981 to bring together researchers in the field of computer science |
|
NSFNET |
a high speed network created by the national science foundation in 1986 that established connections to smaller regional networks, other agencies, networks, CSNET, and ARPANET. |
|
Backbone |
refers to the connections that carry most of the interests traffic |
|
World Wide Web |
a global system of linked, hypertext documents known as web pages. |
|
hyperlink |
a word or picture users can click on to immediately jump to another location within the same document or to a diff. web page. |
|
web pages |
a web based document |
|
website |
several related web pages that connect to each other |
|
web server |
a server that hosts websites |
|
HTTP |
hypertext transfer protocol. it helps web servers deliver a requested page to a users computer. |
|
HTML |
hypertext markup language. its used to create web pages |
|
URL |
A standard addressing system that allows web pages to be located on the internet. |
|
HTTPS |
a secure, encrypted version of HTTP |
|
Domain name |
the portion of a URL that uniquely identifies a site and a brand on the web. Ex: example.com, apple.com, etc |
|
Subdomain |
a portion of a URL that usually indicates a specific subdivision or server within a large site. Ex: sports.yahoo.com |
|
|
A system of exchanging messages through a computer network |
|
Spam |
Unsolicited math that is sent in bulk |
|
To: |
This contains the email address of the primary recipients of your message. |
|
Cc. |
Carbon copy, is used to send a copy of your message to individuals other than your primary ones. |
|
Subject |
The topic or purpose of the eamil |
|
Bcc |
Any email address placed here will be invisible to the recipients of your message. |
|
Attachment |
A file attached to an email message |
|
real-time communication |
when messages and conversations between two or more people occur instantaneously |
|
Instant messaging |
the act of having an online, text-based conversation with one or more individual |
|
VoiP |
Voice over internet protocol translates analog voice signals into digital data and uses the internet to transport the data; can connection to telephone networks and digital sources such as PCs. |
|
podcasts |
a type of prerecorded webcasts that users typically subscribe to for future streaming or automatic downloading. |
|
peer to peer |
a file transfer method that uses a distributed network of individual users instead of a central server to transfer files |
|
MOOC |
huge online courses offered for free by a variety of universities |
|
ISP |
telecommunications companies that offer internet access to homes and business. |
|
bps |
bits per seconds are units of measurement used to teach speed at which data travels to and from ISP. |
|
dial-up |
an older type of interest connection that uses analog signals over a phone line |
|
modem |
A device that can convert digital information from a computer into the analog sound waves that can be transmitted over phone lines. |
|
Broadband |
Any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies. |
|
residential gateway |
device that connects your homes network to the internet |
|
data plan |
a subscription that allows individuals to connect to the internet using a cellular network |
|
Mobile hotspot |
A device that can connect to a mobile network and offer Internet access to multiple devices near it. |
|
tethering |
A feature that makes a phone act as a wireless access point. |
|
Cache (browser) |
Also known as temporary Internet files, the browser cache stores every single page, image, and video for all the web pages you have recently retrieved. |
|
Cookie |
A small data file created by a web browser that remembers your preferences for a specific website. |
|
plug in |
A separate program that allows your web browser to play several types of multimedia content. Ex: Adobe flash player |
|
extension |
a program used to adda variety of useful features to the web browser |
|
Search engine |
A sophisticated combination of hardware and software that stores the URL of millions of web pages and most of the content on those pages. When users type specific keywords into the search engine, they will receive an organized list of matching sites, images, and articles that contain those keywords. |
|
web portal |
A website that provides a variety of useful information and services to visitors. Ex: Yahoo and MSN |
|
Forums |
Discussion boards where individuals can ask questions and reply to each other. |
|
social media |
A variety of websites and services that allow individuals to share photos, news, and thoughts with other individuals. |
|
Web 2.0 |
A term that refers to a new way to use the web, whereby any user can create and share content, as well as provide opinions on existing content. |
|
blog |
A web page or small website that contains a series of chronological posts and comments. |
|
microblogging |
A short-form blog where users share brief thoughts, links, and multimedia. |
|
e-commerce |
doing business online |
|
online payment serevice |
a company that offers a secure and convenient way to pay for online goods and services |
|
pay per click |
A payment model where advertisers pay for their ads only when a Web site visitor clicks on the ad to go to the advertiser's Web site |
|
Network |
A connection between computers that allows users to communicate and share information |
|
LAN |
A data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media. |
|
WAN |
The connection of two or more central computers or LANs, generally across a wide geographical area. |
|
Intranet |
An internal version of the Internet containing information that is restricted to a particular company's employees. |
|
extranet |
A service that allows organizations to share some of its intranet resources with people outside the organization. |
|
attenuation |
The loss of intensity and clarity of a transmitted data signal. |
|
bandwidth |
In networks, it refers to the amount of data that can be transmitted over a given amount of time. |
|
node |
a connection point within a network |
|
network media |
The means used to link parts of a computer network. |
|
Twisted-paid cable |
A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic. |
|
coaxial cable |
A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield. |
|
fiber optic cable |
A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. |
|
Wifi
|
also called 802.11 |
|
packets |
Pieces of a message broken down into small units by the sending device and reassembled by the receiving device in a network. |
|
topology |
the logical layout of the cables and decides that connect the nodes of the network. |
|
IS |
Information system: A complex system for acquiring, storing, organizing, using, and sharing data and information. |
|
office automation system |
A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently. |
|
TPS |
Transaction processing system: A type of information system that handles the processing and tracking of transactions. |
|
MIS |
management information system is set of software tools that enables managers to gather, organize, and evaluate information |
|
DSS |
Decision support system : A special application that collects and reports certain types of data, thus helping managers make better decisions. |
|
expert system |
A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions. |
|
Fault-tolerant |
Systems that are able to continue their operation even when problems are present. |
|
Redundant |
Computers that have multiple hardware systems performing the same task at the same time. |
|
RAID |
A storage system that links any number of disk drives (a disk array) so that they act as a single disk. |
|
Scalability |
The capacity to provide increasing amounts of computing power, storage, and/or software. |
|
Interoperability |
The ability of each organization's information system to work with the other, sharing data and services. |
|
Data warehouse |
A central repository where records from multiple databases are stored. |
|
Data Mining |
The discovery of new patterns or relationships between data. |
|
Data Validation |
A method for checking and improving the reliability of data. |
|
Threat |
anything that can cause harm |
|
vulnerability |
A weakness that has not been protected against threats, thereby making it open to harm. |
|
risk assessment |
Identifying and examining possible threats to a computer system. |
|
countermeasure |
Any step you take to ward off a threat. |
|
surge protector |
An inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur. |
|
UPS |
Uninterruptible power supply is a device that contains both a surge protector and rechargeable battery, allowing your computer system to run for a limited amount of time during a power failure. |
|
Malware |
A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information. |
|
scareware |
A type of scam whose goal is to scare the user into doing exactly what the thief wants. |
|
virus |
A type of malware that is attached to a host file and has the ability to replicate, or copy, itself. |
|
worm |
A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file. |
|
trojan horse |
A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. |
|
spyware |
Malware that reports activity on your computer to another party. |
|
Hacker |
In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks. |
|
cybercrime |
The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks. |
|
Hacktivism |
Hacking with a social or political agenda. |
|
cyberterrorism |
A dangerous form of hacking that seeks to create large-scale chaos and damage to a country's infrastructure. |
|
zombie |
An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner. |
|
botnets |
Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. |
|
DDoS |
Distributed denial of service is a network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests. |
|
Rogue hotspots |
A wireless access point set up by a hacker in a public area to intercept users' communication. |
|
identity theft |
A type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name. |
|
Social engineering |
A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs. |
|
Pretexting |
Gaining someone's trust by pretending you are someone else. |
|
Phishing |
Luring individuals into entering personal information into a website controlled by a hacker. |
|
VPN |
A type of connection that increases the security of network communication by employing a method called "tunneling", whereby each packet from the sending computer is encapsulated within another packet.` |
|
Authentication |
A security measure used to confirm an individual's identity. |
|
Authorization |
A security measure used to give individuals a certain level of access based on who they are. |
|
Tape Library |
A large storage unit that houses multiple tape drives. |
|
Ethics |
The philosophical study of morality. |
|
Empathy |
the ability to recognize, understand, and share the feelings of others |
|
Piracy |
Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator. |
|
intellectual property |
Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form. |
|
copyright |
a legal concept that grants rights and control to the owner of any published work |
|
public domain |
A term that refers to creative works whose copyright has expired or never existed in the first place. These works can be freely used without permission. |
|
fair use |
An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission. |
|
DRM |
Digital rights management is Technologies used to protect copyrighted material. |
|
attribution |
Credit to the author of a work wherever it is used. |
|
creative commons |
A license that allows an author to set conditions for the free use and distribution of their work. |
|
thread |
In a forum, a topic that contains related posts. |
|
flaming |
Online social interactions that exhibit anger and/or insults. |
|
trolling |
A type of social interaction where a user acts in an annoying and antagonistic manner. |
|
cyberbullying |
An online form of aggression that involves repeated hostile behavior with intent to harm another individual. |
|
AUP |
Acceptable use policy is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. |
|
log |
A file that records activities and events. |
|
digital footprints |
A trail of your data, activity, and the locations where devices are used. |
|
privacy policy |
A website's written statement that clearly states what information is collected from users and what is done with that information. |
|
private browsing |
A feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window. |
|
do not track |
A browser feature that attempts to stop websites from automatically sharing details about your visit with other companies. |
|
anonymity software |
Software that helps mask your IP address from websites. |
|
digital divide |
The technology gap that exists between different social and economic classes. |
|
whistleblowing |
The act of alerting the public about harmful activities that are being hidden by an organization. |
|
green computing |
The principle of reducing the environmental impact of computers. |
|
power management |
The ability to place computers and devices in low-power states when they are not being used. |
|
sleep |
A computer state that uses only enough electricity to keep the contents of your RAM active. |
|
hibernate |
A computer state that saves electricity by copying the contents of RAM to your hard drive. |
|
paperless |
The use of technology by companies and individuals to lower their consumption and reliance on paper. |
|
telecommuting |
The process of working for a company without being physically present at the company's office. |
|
outsourcing |
An organization's transfer of some aspect of its business to a third party. |
|
offshoring |
A company's outsourcing of certain business functions to another country. |
|
Outsourcing |
An organization's transfer of some aspect of its business to a third party. |
|
Automation |
The use of computers or machines to perform the work that was once done by a human. |
|
Humanoid robot |
A robot that is created to imitate the appearance or capabilities of humans. |
|
Artificial intelligence (AI) |
Involves the development of intelligent systems or machines that possess capabilities such as learning, problem solving, and communication. |
|
turing test |
A test for artificial intelligence that measures a system's ability to hold a human-like conversation. |
|
Biotechnology |
An application of biology that uses living organisms to manufacture new products or improve existing ones. |
|
nanotechnology |
The creation or manipulation of matter at the smallest possible scale. |
|
Software engineer |
A person responsible for the development of computer software. |
|
systems analyst |
A person who specializes in developing plans and recommendations that meet the software and system needs of an organization. |
|
Database administrator (DBA) |
An individual who is responsible for configuring, maintaining, and securing an organization's database. |
|
Web developer |
A person who creates and maintains websites for organizations. |
|
Search engine optimization (SEO) |
The process of improving the ranking of a website when users enter relevant keywords in a search engine. |
|
Graphic design |
The art or skill of editing photos and designing layouts. |
|
Social media strategist |
An expert in sales and marketing who uses the web and various social media tools. |
|
Network administrator |
A person responsible for configuring and maintaining networks and communication systems. |
|
Computer support specialist |
An individual who is responsible for installing, configuring, and supporting computer systems. |
|
Search engine optimization (SEO) |
The process of improving the ranking of a website when users enter relevant keywords in a search engine. |
|
help desk |
A department at a company that can repair and troubleshoot systems, as well as provide technical support to employees. |
|
Information systems manager |
A person responsible for managing a diverse team of IT professionals that include programmers, network administrators, and many others. |