• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/60

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

60 Cards in this Set

  • Front
  • Back

accesskey attribute

is used with forms and links to allow the user to use keyboard keys, and to use the functions which are performed using a mouse. It requires that the author has specified an access key assignment for that link, using the accesskey attribute.

ActiveX controls

are software components that can be integrated into Web pages and applications, within a computer or among computers in a network, to reuse the functionality.

Adobe Dreamweaver

is a standard Web development application that provides lots of tools for editing and designing the Web sites without writing the code. There is an option available to write the code for designing the Web page but it may not be required.

Adobe Fireworks

is a bitmap and vector graphics editor, used by Web designers for rapidly creating Web site prototypes and application interfaces. It provides the facility of creating slices and the ability to add hotspots

Adobe Flash Professional

is an application that provides base to multimedia and rich internet application. It is used to add animation, video, and interactivity to Web pages. Flash modifies vector and raster graphics to provide animation of text, drawings, and still images.

Anchor tag

is used to create a source (hyperlink) or destination (section) anchor in an HTML page. Anchors are created using the <a.. >.. </a> construct.

ASF

stands for Advanced Streaming Format which uses streaming media technology for arranging and organizing synchronized multimedia data.

ASP

stands for Active Server Pages was developed by Microsoft. It was Microsoft's first server-side script engine for dynamically generated Web pages.

Body Tag

is used to define the left margin attribute. It contains all the contents of a Web page such as text, images, colors, graphics, etc.

Cookie

is a small bit of text that accompanies requests and pages as they move between Web servers and browsers

DHTML

stands for Dynamic HTML. It enables Web authors to create highly interactive Web pages. DHTML provides a set of technologies for creating dynamic content for Web sites.

Dithering

is a technique by which the appearance of colors not included in the color palette is simulated. It is done by arranging two or more colors in a pattern.

DOM

stands for the Document Object Model, is a cross-platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents.

DoS attack

causes a negative impact on the performance of a computer or network. This attack is designed to bring loss of network connectivity and services by consuming the bandwidth of the user's network.

Event

is an occurrence that triggers a notification. It can be triggered by direct or indirect user actions.

External Style Sheet

are independent file that contain only style information. When any style has to be associated with an element in the Web page, the file is attached to the Web page and the required style information is called.

Extranet

is an area of a Web site which is available only to selected customers, suppliers, and mobile workers. It allows users limited access to a company's intranet.

Flood attack

an attacker sends more and more traffic to the victim than it could handle

FQDN

stands for Fully Qualified Domain Name, is a unique name of a host or computer, which represents its position in the hierarchy. An FQDN begins with a host name and ends with the top-level domain name.

IETF

stands for Internet Engineering Task Force, is an open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and coordination of the operation and management of the Internet.

Image Map

is an image on a Web page, which contains more than one hyperlink. The image can be a photograph, drawing, or a combination of several different drawings or photographs. It is divided into different parts and each part is linked to a different Web page or file.

Impersonation attack

attempts to access the computer by using a valid user password.

Inline script

is a method of scripting in which the script is embedded within the HTML tags of a Web page.

Inline Style Sheet

are used to define style for individual elements of a Web page. It is mentioned with each instance of the tag. The priority for inline is the highest.

Internet

is a global network of computers, connected to each other using the TCP/IP protocol. Internet web sites are available to all users.

Intranet

is a private network that is contained within an enterprise. An intranet is used to share company information and computing resources among employees. It is also used to facilitate working in groups and for teleconferencing.

Java

is an object oriented programming language developed by Sun Microsystems. It allows the creation of platform independent executable. Java source code files are compiled into a format known as bytecode.

Java applet

is a software program written in Java language. It is distributed as an attachment in a Web document and executed in a Java-enabled Web browser

JSP

stands for Java Server Pages, is a technology that helps to dynamically generate Web pages based on HTML, XML, or other document types.

Jump menu

is a navigation tool supported by Dreamweaver. It is a drop-down menu that automatically links to a specified URL when a user makes a selection.

Macro virus

is a macro or script that attaches itself to a file or template. When the file is loaded, the instructions of the macro or script are executed

Man-in-the-middle

attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Metadata

can be used to provide information about the author of a Web page. Metadata is information about data. It describes how, when, and by whom a set of data was collected. It can also provide the information about the formatting of data. It is hidden information saved with the Web pages.

Microsoft FrontPage

is an HTML editor that is used to design the Web page by dragging and dropping the elements into the page. The developer does not need to write the code to insert the element in the page. The code is generated by the application itself

MPEG

stands for Motion Picture Experts Group. MPEG-2 is a video compression format that saves space by saving only the data that change on the screen.

Ping attack

is an attack where a computer repeatedly sends illegitimate, oversized ICMP echo requests to another computer. PING attacks are targeted to specific TCP stacks that cannot handle ICMP packets

Plug-in

is a computer program that is used with host applications such as Web browsers, e-mail clients, etc. It is created to provide certain specific functions. A plug-in is separate from a host application.

QTVR

stands for QuickTime Virtual Reality, allows the creation and viewing of photographically-captured panoramas and the exploration of objects through images taken at multiple viewing angles.

Raster Image

or bitmap, is a dot matrix data structure representing a generally rectangular grid of pixels, or points of color, viewable via a monitor, paper, or other display medium.

RealAudio

is an example of a browser plugin. RealAudio format file can be played by using the RealAudio player or plugin. RealAudio is a special audio format that has been optimized for playing on slow modem connections.

RealPlayer

is an application that enables users to view and listen to streaming video and audio over the Internet.

Rendering

is the process of generating an image from a model using computer programs. The data contained in the scene file is passed to a rendering program to be processed and output to a digital image or raster graphics image file.

Replay attack

is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network.

RFC

stands for Request for Comment, is a document series proposed by Internet research and development community, an autonomous body, to describe the Internet suite of protocols and related experiments.

RSS

stands for Rich Site Summary is a family of Web feed formats used to publish frequently updated works, such as blog entries, news headlines, audio, and video in a standardized format.

SAPI

stands for Speech Application Programming Interface. It is an application programming interface that allows speech-enabled applications to use speech recognition and text to speech capabilities.

Screen Reader

is utility software used to recite text that appears on the computer screen. It also reads non-textual information, such as button labels or image descriptions in the application, provided in accessibility tags or attributes during authoring.

Session variable

holds information about one single user, and are available to all pages in one application.

Site Map

is an online table of contents. It is a Web page that provides hyperlinks to Web site resources. A site map is an extremely useful navigation mechanism for most Web sites.

SVG

stands for Scalable Vector Graphics, is a language for describing 2D-graphics and graphical applications in XML. It is used to define vector-based graphics for the Web in XML format. SVG graphics do not lose any quality if they are zoomed or resized.

SWF

stands for Shockwave File, is a vector graphics file format. The SWF files are small in size and are appropriate for publication on the Web. They can contain animations or applets with interactivity and various functions. As SWF files are compressed, they can be downloaded quickly.

URL

stands for Uniform Resource Locator, is a string that supplies the Internet address of a Web site or a resource, on the World Wide Web, along with the protocol by which the site or resource is accessed.

Vector Image

is based on images made up of vectors (also called paths, or strokes) which lead through locations called control points. Each of these points has a definite position on the x and y axes of the work plan.

Virus

is a malicious program. A computer virus passes from one computer to another in the same way as a biological virus passes from one person to another. Most viruses are written with a malicious intent, so that they can cause damage to programs and data in addition to spreading themselves.

VRML

stands for Virtual Reality Modeling Language, is a technology that allows Web developers to create three-dimensional (3-D) spaces and objects in full color with special texture, interactive animation, and lighting effects.

VRML

stands for Virtual Reality Modeling Language, is a standard file format for representing 3-dimensional (3D) interactive vector graphics.

Vulnerability attack

takes advantage of the vulnerabilities in an operating system or software service by entering the operating system and disrupting its working.

W3C

is an international industry consortium that develops common standards for the World Wide Web to promote its evolution and interoperability

Web service discovery

is a preliminary process for accessing a Web site. It locates Web service descriptions.

XML schema

is a formalized model of objects and their relationships. It allows users to define rules for governing relations between elements and attributes.