• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/161

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

161 Cards in this Set

  • Front
  • Back

ARPANET

a predecessor to the internet, this government-funded network connected four U.S universities in 1969.

protocols

a set of rules or standards that must be followed by computers that wish to communicate over a network.

TCP/IP

protocols at the heart of internet communcation

IP address

a unique set of numbers and/or letters that uniquely identifies every computer or device on the internet.

CSNET

an early computer network created in 1981 to bring together researchers in the field of computer science

NSFNET

a high speed network created by the national science foundation in 1986 that established connections to smaller regional networks, other agencies, networks, CSNET, and ARPANET.

Backbone

refers to the connections that carry most of the interests traffic

World Wide Web

a global system of linked, hypertext documents known as web pages.

hyperlink

a word or picture users can click on to immediately jump to another location within the same document or to a diff. web page.

web pages

a web based document

website

several related web pages that connect to each other

web server

a server that hosts websites

HTTP

hypertext transfer protocol. it helps web servers deliver a requested page to a users computer.

HTML

hypertext markup language. its used to create web pages

URL

A standard addressing system that allows web pages to be located on the internet.

HTTPS

a secure, encrypted version of HTTP

Domain name

the portion of a URL that uniquely identifies a site and a brand on the web. Ex: example.com, apple.com, etc

Subdomain

a portion of a URL that usually indicates a specific subdivision or server within a large site. Ex: sports.yahoo.com

Email

A system of exchanging messages through a computer network

Spam

Unsolicited math that is sent in bulk

To:

This contains the email address of the primary recipients of your message.

Cc.

Carbon copy, is used to send a copy of your message to individuals other than your primary ones.

Subject

The topic or purpose of the eamil

Bcc

Any email address placed here will be invisible to the recipients of your message.

Attachment

A file attached to an email message

real-time communication

when messages and conversations between two or more people occur instantaneously

Instant messaging

the act of having an online, text-based conversation with one or more individual

VoiP

Voice over internet protocol translates analog voice signals into digital data and uses the internet to transport the data; can connection to telephone networks and digital sources such as PCs.

podcasts

a type of prerecorded webcasts that users typically subscribe to for future streaming or automatic downloading.

peer to peer

a file transfer method that uses a distributed network of individual users instead of a central server to transfer files

MOOC

huge online courses offered for free by a variety of universities

ISP

telecommunications companies that offer internet access to homes and business.

bps

bits per seconds are units of measurement used to teach speed at which data travels to and from ISP.

dial-up

an older type of interest connection that uses analog signals over a phone line

modem

A device that can convert digital information from a computer into the analog sound waves that can be transmitted over phone lines.

Broadband

Any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

residential gateway

device that connects your homes network to the internet

data plan

a subscription that allows individuals to connect to the internet using a cellular network

Mobile hotspot

A device that can connect to a mobile network and offer Internet access to multiple devices near it.

tethering

A feature that makes a phone act as a wireless access point.

Cache (browser)

Also known as temporary Internet files, the browser cache stores every single page, image, and video for all the web pages you have recently retrieved.

Cookie

A small data file created by a web browser that remembers your preferences for a specific website.

plug in

A separate program that allows your web browser to play several types of multimedia content. Ex: Adobe flash player

extension

a program used to adda variety of useful features to the web browser

Search engine

A sophisticated combination of hardware and software that stores the URL of millions of web pages and most of the content on those pages. When users type specific keywords into the search engine, they will receive an organized list of matching sites, images, and articles that contain those keywords.

web portal

A website that provides a variety of useful information and services to visitors. Ex: Yahoo and MSN

Forums

Discussion boards where individuals can ask questions and reply to each other.

social media

A variety of websites and services that allow individuals to share photos, news, and thoughts with other individuals.

Web 2.0

A term that refers to a new way to use the web, whereby any user can create and share content, as well as provide opinions on existing content.

blog

A web page or small website that contains a series of chronological posts and comments.

microblogging

A short-form blog where users share brief thoughts, links, and multimedia.

e-commerce

doing business online

online payment serevice

a company that offers a secure and convenient way to pay for online goods and services

pay per click

A payment model where advertisers pay for their ads only when a Web site visitor clicks on the ad to go to the advertiser's Web site

Network

A connection between computers that allows users to communicate and share information

LAN

A data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media.

WAN

The connection of two or more central computers or LANs, generally across a wide geographical area.

Intranet

An internal version of the Internet containing information that is restricted to a particular company's employees.

extranet

A service that allows organizations to share some of its intranet resources with people outside the organization.

attenuation

The loss of intensity and clarity of a transmitted data signal.

bandwidth

In networks, it refers to the amount of data that can be transmitted over a given amount of time.

node

a connection point within a network

network media

The means used to link parts of a computer network.

Twisted-paid cable

A cable that consists of four pairs of wires that are twisted around each other. Each copper wire is insulated in plastic, and all wires are collectively bound together in a layer of plastic.

coaxial cable

A cable that consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

fiber optic cable

A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Wifi

also called 802.11

packets

Pieces of a message broken down into small units by the sending device and reassembled by the receiving device in a network.

topology

the logical layout of the cables and decides that connect the nodes of the network.

IS

Information system: A complex system for acquiring, storing, organizing, using, and sharing data and information.

office automation system

A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.

TPS

Transaction processing system: A type of information system that handles the processing and tracking of transactions.

MIS

management information system is set of software tools that enables managers to gather, organize, and evaluate information

DSS

Decision support system : A special application that collects and reports certain types of data, thus helping managers make better decisions.

expert system

A type of information system that performs analytical tasks traditionally done by a human, using sequences of questions to ask and actions to take based on the responses to those questions.

Fault-tolerant

Systems that are able to continue their operation even when problems are present.

Redundant

Computers that have multiple hardware systems performing the same task at the same time.

RAID

A storage system that links any number of disk drives (a disk array) so that they act as a single disk.

Scalability

The capacity to provide increasing amounts of computing power, storage, and/or software.

Interoperability

The ability of each organization's information system to work with the other, sharing data and services.

Data warehouse

A central repository where records from multiple databases are stored.

Data Mining

The discovery of new patterns or relationships between data.

Data Validation

A method for checking and improving the reliability of data.

Threat

anything that can cause harm

vulnerability

A weakness that has not been protected against threats, thereby making it open to harm.

risk assessment

Identifying and examining possible threats to a computer system.

countermeasure

Any step you take to ward off a threat.

surge protector

An inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

UPS

Uninterruptible power supply is a device that contains both a surge protector and rechargeable battery, allowing your computer system to run for a limited amount of time during a power failure.

Malware

A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information.

scareware

A type of scam whose goal is to scare the user into doing exactly what the thief wants.

virus

A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

worm

A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.

trojan horse

A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

spyware

Malware that reports activity on your computer to another party.

Hacker

In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.

cybercrime

The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.

Hacktivism

Hacking with a social or political agenda.

cyberterrorism

A dangerous form of hacking that seeks to create large-scale chaos and damage to a country's infrastructure.

zombie

An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.

botnets

Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

DDoS

Distributed denial of service is a network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.

Rogue hotspots

A wireless access point set up by a hacker in a public area to intercept users' communication.

identity theft

A type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name.

Social engineering

A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Pretexting

Gaining someone's trust by pretending you are someone else.

Phishing

Luring individuals into entering personal information into a website controlled by a hacker.

VPN

A type of connection that increases the security of network communication by employing a method called "tunneling", whereby each packet from the sending computer is encapsulated within another packet.`

Authentication

A security measure used to confirm an individual's identity.

Authorization

A security measure used to give individuals a certain level of access based on who they are.

Tape Library

A large storage unit that houses multiple tape drives.

Ethics

The philosophical study of morality.

Empathy

the ability to recognize, understand, and share the feelings of others

Piracy

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.

intellectual property

Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form.

copyright

a legal concept that grants rights and control to the owner of any published work

public domain

A term that refers to creative works whose copyright has expired or never existed in the first place. These works can be freely used without permission.

fair use

An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission.

DRM

Digital rights management is Technologies used to protect copyrighted material.

attribution

Credit to the author of a work wherever it is used.

creative commons

A license that allows an author to set conditions for the free use and distribution of their work.

thread

In a forum, a topic that contains related posts.

flaming

Online social interactions that exhibit anger and/or insults.

trolling

A type of social interaction where a user acts in an annoying and antagonistic manner.

cyberbullying

An online form of aggression that involves repeated hostile behavior with intent to harm another individual.

AUP

Acceptable use policy is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

log

A file that records activities and events.

digital footprints

A trail of your data, activity, and the locations where devices are used.

privacy policy

A website's written statement that clearly states what information is collected from users and what is done with that information.

private browsing

A feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

do not track

A browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.

anonymity software

Software that helps mask your IP address from websites.

digital divide

The technology gap that exists between different social and economic classes.

whistleblowing

The act of alerting the public about harmful activities that are being hidden by an organization.

green computing

The principle of reducing the environmental impact of computers.

power management

The ability to place computers and devices in low-power states when they are not being used.

sleep

A computer state that uses only enough electricity to keep the contents of your RAM active.

hibernate

A computer state that saves electricity by copying the contents of RAM to your hard drive.

paperless

The use of technology by companies and individuals to lower their consumption and reliance on paper.

telecommuting

The process of working for a company without being physically present at the company's office.

outsourcing

An organization's transfer of some aspect of its business to a third party.

offshoring

A company's outsourcing of certain business functions to another country.

Outsourcing

An organization's transfer of some aspect of its business to a third party.

Automation

The use of computers or machines to perform the work that was once done by a human.

Humanoid robot

A robot that is created to imitate the appearance or capabilities of humans.

Artificial intelligence (AI)

Involves the development of intelligent systems or machines that possess capabilities such as learning, problem solving, and communication.

turing test

A test for artificial intelligence that measures a system's ability to hold a human-like conversation.

Biotechnology

An application of biology that uses living organisms to manufacture new products or improve existing ones.

nanotechnology

The creation or manipulation of matter at the smallest possible scale.

Software engineer

A person responsible for the development of computer software.

systems analyst

A person who specializes in developing plans and recommendations that meet the software and system needs of an organization.

Database administrator (DBA)

An individual who is responsible for configuring, maintaining, and securing an organization's database.

Web developer

A person who creates and maintains websites for organizations.

Search engine optimization (SEO)

The process of improving the ranking of a website when users enter relevant keywords in a search engine.

Graphic design

The art or skill of editing photos and designing layouts.

Social media strategist

An expert in sales and marketing who uses the web and various social media tools.

Network administrator

A person responsible for configuring and maintaining networks and communication systems.

Computer support specialist

An individual who is responsible for installing, configuring, and supporting computer systems.

Search engine optimization (SEO)

The process of improving the ranking of a website when users enter relevant keywords in a search engine.

help desk

A department at a company that can repair and troubleshoot systems, as well as provide technical support to employees.

Information systems manager

A person responsible for managing a diverse team of IT professionals that include programmers, network administrators, and many others.