• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/303

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

303 Cards in this Set

  • Front
  • Back

In which stage of the software development life cycle are specifications produced?

design
proposal and planning
implementation
testing

design
What does it mean when a software product is declared “gold”?

It has sold more than a million copies.
It is free from errors.
It is ready to be released to the public.
It has won an award for excellence in software development.
It is ready to be released to the public.
If you wrote a Java program and saved it to disk, what type of file would it be?

a batch file
a source code file
an executable file
a database file
a source code file
Which programming approach includes a protected set of variables?

object-oriented programming
modules
rapid application development
structured programming
object-oriented programming
QA stands for quality assistance.

True
False
False
What indicates the start of a comment in a C-based language?

quotation marks
parenthesis
forward slashes
exclamation marks
forward slashes
Which one of the following refer to a low-level language?

machine code
pseudocode
hacking code
dead code
machine code
Hardware technology improves at a faster rate than improvements in software development.

True
False
True
Which programming approach was developed to bring order to the chaotic field of programming?

structured programming
modules
object-oriented programming
rapid application development
structured programming
Which one of the following is a scripting language?

RPG
DHTML
C++
Visual Basic
DHTML
Most professional software sold today is written in some form of

DHTML.
VB.
C or C++.
WML.
C or C++.
In contrast to high-level languages, low-level languages

are easier to learn and use.
are similar to human languages.
run faster.
take up more disk space.
run faster.
Before a program is considered ready for public release, it must undergo a scripted set of tests called a

test run.
test battery.
test gauntlet.
test harness.
test harness.
What might programmers call a colleague who has lazy habits and sloppy workmanship?

hacker
packer
backer
slacker
hacker
Modularity refers to the degree to which program elements are

standardized.
protected from error.
independent and reliable.
structured.
independent and reliable.
Which classic programming element refers to the ability to repeat parts of the program?

variables
executable statements
looping
decision statements
looping
Assembly language was developed to replace

scripting languages.
popular languages.
graphical user interface languages.
machine code.
machine code.
At which stage of the problem-solving process is the program actually coded?

Implement and test the solution.
Write an algorithm.
Brainstorm solutions and choose the best one.
Analyze the problem.
Implement and test the solution.
Which one of the following is a commonly used 4GL?

COBOL
assembly language
BASIC
HTML
HTML
How many generations of computer programming language currently exist?

four
five
six
seven
five
Identifying the problem and analyzing the problem are the same thing.

True
False
False
In contrast to human languages, programming languages

have larger vocabularies.
contain 100 to 200 words and symbols.
are much more complex.
have more difficult syntax.
contain 100 to 200 words and symbols.
Infinite loops cause computers to “lock-up” or “freeze.”

True
False
True
The process of writing a computer program is similar to

drawing a map.
developing a photo.
writing a term paper.
drawing a picture.
writing a term paper.
Which documentation tool is used primarily by beginning programmers?

flowcharts
comments
CASE tools
Gantt charts
flowcharts
Identifying the problem and analyzing the problem are the same thing.

True
False
False
In contrast to human languages, programming languages

have larger vocabularies.
contain 100 to 200 words and symbols.
are much more complex.
have more difficult syntax.
contain 100 to 200 words and symbols.
Infinite loops cause computers to “lock-up” or “freeze.”

True
False
True
The process of writing a computer program is similar to

drawing a map.
developing a photo.
writing a term paper.
drawing a picture.
writing a term paper.
Which documentation tool is used primarily by beginning programmers?

flowcharts
comments
CASE tools
Gantt charts
flowcharts
Which movie format is specifically for Apple?

MOV
AVI
MPEG
MPEG2
MOV
What would be used to create the underlying shape of a three-dimensional object on a two-dimensional surface?

a wireframe diagram
a GIF image
a raster image
CG FX
a wireframe diagram
What problem does the Flash format solve?

increased time for digital cable picture to come into focus
need for increased bandwidth with HDTV
illegal copying of DVD movies
long download time on Web pages that have moving images
long download time on Web pages that have moving images
What is the science of moving a mobile robot through an environment called?

elocution
locomotion
navigation
electrocution
navigation
The quality of a virtual reality system is characterized in terms of its

reality.
inventiveness.
immersiveness.
escapism.
immersiveness.
What program do you need installed on your computer in order to create PDF documents?

Adobe Acrobat
Quark Immedia
mTropolis
Macromedia Director
Adobe Acrobat
Getting a robot to know how hard to squeeze an object is a problem of

locomotion.
tactile perception.
visual perception.
audio perception.
tactile perception.
In contrast to bitmap graphics, vector graphics

can reproduce detailed images.
list every pixel the computer should draw on the screen.
take a megabyte or more of disk space to store.
store an image as a series of shapes.
store an image as a series of shapes.
What term characterizes the degree to which a virtual reality game feels real?

transientness
submissiveness
immersiveness
timeliness
immersiveness
In contrast to compressed graphics files, bitmap graphics files

are frequently used on Web pages.
display more quickly than other file formats.
take up much less disk space.
draw perfect images.
draw perfect images.
How many times can a digital copy be reproduced with no degradation of quality?

500
50,000
5 million
infinitely
infinitely
Which AI technology attempts to actually simulate the workings of the human mind?

intelligent agents
genetic algorithms
neural networks
expert systems
neural networks
Cynthia Breazeal is known for her efforts to build a type of

musical robot.
autonomous robot.
walking robot.
sociable robot.
sociable robot.
Where might clip art be used?

Web page
video game
animated movie
3D modeling program
Web page
Which movie was made with the aid of CG FX?

Star Wars
Cars
Adventures of Mickey Mouse
The Wizard of Oz
Cars
What do bitmaps digitize?

images
sounds
video
text
images
What is the last step in creating a multimedia application?

starting the design cycle all over again
contracting with support staff to maintain it
writing the work to a portable storage medium
releasing it to the public
writing the work to a portable storage medium
Massively multiplayer online games are considered advanced programs because

they have been developed by experts in multimedia and artificial intelligence.
they allow players to create their own avatars and virtual reality.
they involve enormous numbers of online players interacting in real time.
they merge the fields of graphics, online interaction, and artificial intelligence.
they merge the fields of graphics, online interaction, and artificial intelligence.
AVI and MOV are media storage formats used for compressed video.

True
False
True
At the present time, graphic artists generally use separate programs for creating and editing graphics.

True
False
True
This illustration is an example of

converting an analog signal.
using a natural-language interface.
making a music CD.
digitizing graphics.
converting an analog signal.
Speech-based interface will make it possible for computers

to become less expensive.
to become wearable.
to grow in power.
to shrink in size.
to become wearable.
Creating a robot that can solder tiny joints is a problem in tactile perception.

True
False
False
What do tabloid newspapers use to alter the photos of movie stars?

computer graphic special effects
vector graphics
raster image-editing programs
3D modeling programs
raster image-editing programs
A four-letter file name extension such as .tiff goes with Macintoshes.

True
False
True
When adults come across offensive or unwanted material on the Internet, they should

e-mail the Web site with their objections.
complain to the Internet service provider.
inform local law enforcement officials.
click the Back button on the browser and leave the site.
click the Back button on the browser and leave the site.
What protection do employees have against employer monitoring of their behavior?

the ACLU’s Fair Electronic Monitoring Policy
laws that prevent electronic surveillance of employees in the workplace
a company pledge to respect any aspect of employee privacy
All of the above
a company pledge to respect any aspect of employee privacy
Computer ethics is considered a branch of normative ethics.

True
False
False
What might be a new ethical question in the future?

Should the government control Internet content?
Should strict copyright laws be enforced?
Should Web sites be allowed to compile consumer profiles?
Should robots be prevented from copying certain human behaviors?
Should robots be prevented from copying certain human behaviors?
What type of ethical issue is involved when young people download music from the Internet?

personal and social issues
property protection issues
public protection issues
privacy protection issues
property protection issues
It would be considered fair use of protected material to use which of the following without permission?

a young child’s storybook
stanza of poetry
line from a poem
chapter from a novel
line from a poem
What type of ethical issue is involved when a Web site preaches overthrow of the U.S. government?

property protection issues
privacy protection issues
public protection issues
personal and social issues
personal and social issues
Which company attempted to link cookies with names and addresses from a database?

Real Networks
Microsoft
DoubleClick
Intel
DoubleClick
What is different about public information posted on the Internet and public information filed at city hall?

The information is free on the Web.
The information is more accessible on the Web.
The information is more complete at city hall.
There is no difference.
The information is more accessible on the Web.
A virus must enter a computer disguised in another file.

True
False
True
What is the name of the protocol used today to protect the transmission of credit card data over the Web?

NSA
SSL
B2C
ATM
SSL
Computer codes of ethics tell people what to do in difficult situations.

True
False
False
Is it ethical to make free copies of copyrighted materials? This issue was raised by the invention of the

cassette tape recorder.
Napster program.
video recorder.
All of the above
All of the above
Which of the following is not a name of an FBI Internet wiretap program?

Omnivore
Carnivore
Herbivore
DCS1000
Herbivore
Ensuring ethical behavior on computers and the Internet begins with

individual computer users.
teachers.
government.
commercial Web sites.
individual computer users.
As of 2000, what had the federal government done to protect consumer privacy on the Internet?

passed a law protecting children under the age of 13 from privacy violations
passed a law giving consumers the right to choose whether to opt-in to receive cookies or opt-out not to receive cookies
passed a law protecting adults from privacy violations
passed a law forbidding Internet companies from selling personal information
passed a law protecting children under the age of 13 from privacy violations
Gathering information on a person’s lifestyle habits for the purpose of selling products is an example of a

commercial threat to privacy.
government threat to privacy.
workplace threat to privacy.
consumer threat to privacy.
commercial threat to privacy.
What percentage of those 65 or older are online?

6 percent
16 percent
26 percent
36 percent
26 percent
How can you tell if you are using a secure site?

Look for the seal of approval from a third-party organization that promotes industry self-regulation.
Look for the site’s link to a privacy statement.
Look for a yellow key icon in the status bar at the bottom of the page.
Look for https:// in the URL box at the top of the page.
Look for https:// in the URL box at the top of the page.
If you purchase a term paper on the Internet and turn it in as your own work, you are

reproducing.
scanning.
plagiarizing.
stealing.
plagiarizing.
An example of making computer hardware more accessible to people with disabilities is

greater capacity hard disks.
the mouse.
smaller keyboards.
the “sticky keys” feature.
the “sticky keys” feature.
In 1999, a major lawsuit was filed against America Online on behalf of people with

motor impairments.
speech impairments.
auditory impairments.
visual impairments.
visual impairments.
In contrast to patents, copyrights

help protect intellectual property.
encourage and protect artistic and literary endeavors.
award ownership of an idea or invention to its creator for a fixed number of years.
allow people the right to control their creations and charge others for their use.
encourage and protect artistic and literary endeavors.
What will this software protect against?

identity theft
phishing
viruses
All of the above
viruses
Which is not an industrial property classification of the WIPO?

inventions
trademarks
industrial designs
copyright
copyright
In which Microsoft program do MCDBA certificate holders specialize?

Word
Outlook
Excel
Access
Access
Teaching individuals how to use computer systems is called

technical support.
application training.
technical training.
customer support.
technical training.
Cisco certificates are generally good for

one year.
two years.
three years.
four years.
two years.
Software engineers and programmers generally have college degrees in

computer information systems.
computer science.
computer engineering.
electrical engineering.
computer science.
What certification is CompTIA best known for?

A
A+
AA
AAA
A+
All of the following are true of certification tests except

they cost money each time they are taken.
they are fairly easy and most people pass them the first time.
they must be taken at an approved testing center.
they might have a corresponding course of study available at a local community college.
they are fairly easy and most people pass them the first time.
Intel and Microsoft are product developers.

True
False
True
Graduates of a computer information systems degree program are likely to get jobs as

application developers.
hardware designers.
programmers.
system-level software developers.
application developers.
Certification tests are usually lengthy

true-false tests.
multiple-choice tests.
essay tests.
demonstration tests.
multiple-choice tests.
In contrast to smaller IT companies, large IT departments offer

more variety in job tasks.
less job stability.
a more rigid work schedule.
a more relaxed work environment.
a more rigid work schedule.
The information technology industry has been accused of ageism because the majority of the workforce are

male.
young.
middle-aged.
senior citizens.
young.
Application programmers need good interpersonal skills.

True
False
True
The science of designing equipment so that it does not cause the user physical injury is called

georgics.
aeronautics.
histrionics.
ergonomics.
ergonomics.
What is a good tip for anyone hoping to be successful in our modern, technological world?

Become certified in a specialty and stick with it.
Choose a career carefully because it will be your lifelong work.
Spot trends as early as possible and then adjust your career direction accordingly.
Start your own consulting business so you will always have a job.
Spot trends as early as possible and then adjust your career direction accordingly.
In which category of information technology careers do computer engineers generally work?

application development
sales and support
hardware design
software development
hardware design
According to a 2005 survey, what percentage of companies use social networking sites to search for information on job candidates?

10
30
45
75
75
What idea did Michael Dell have?

to start a direct-mail marketing company for computers
to sell made-to-order computers
to make computers accessible to people with visual impairment
to manufacture a more user-friendly personal computer
to sell made-to-order computers
In carpal tunnel syndrome, the carpal tunnel becomes infected.

True
False
False
CompTIA certification programs are vendor specific.

True
False
False
The above is a page from Cisco’s Web site. Cisco is

a two-year college.
an IT company.
an online university.
a computer e-tailer.
an IT company.
Which one of the following abbreviations represents an entry-level Cisco certificate?

CCNP
CCDP
CCIP
CCDA
CCDA
The content to be learned for most of the above certificates changes nearly every

month.
year.
five years.
decade.
year.
In the mid-1990s, which company offered certification in networking that could substitute for college courses?

Novell
Microsoft
Oracle
Cisco
Novell
What business model does Cisco follow?

consultant
product developer
small business
IT department
product developer
What programming approach allows programmers to reuse components?
Modular Code
Low-level programming languages are
closer to what a computer actually executes
An instruction that assigns a value to a unit of memory is considered a(n)
Executable Statement
During which problem-solving step is pseudocode written?
Write the algorithm
Which of these is a documentation tool?

Compiler
Interpreter
Debugger
Flowchart
Applet
Flowchart
Which of the following is an advantage of an interpreted program over a compiled program?

It takes less time to develop an interpreted program than a compiled program to perform the same task.

An interpreted program runs faster than a compiled one.

An interpreted program is managed by a strict runtime manager that forbids it from making unauthorized changes to memory

All of these

A and C only
A and C only
Which tool translates source code into machine code one instruction at a time?
Interpreter
Which of the following is not a classic programming element?

looping
applets
variables
executable statements
decision statements
applets
If-Then instructions are examples of
decision statements
David has just finished analyzing his client's programming problem. Which problem-solving step is next?
Brainstorm Solutions
Mistakes in the way elements of an instruction are phrased, are called
Syntax errors
Which of these is a first generation programming language?

machine code
source code
assembly language
all of these
a and c only
a and c only
What is the name for a high-level, conceptual programming language that computers cannot read?
Pseudocode
Which of the following is an example of a third generation programming language?

assembly
HTML
GUI
C++
ALGOL
C++
High-level programming languages
are easier to learn than low-level ones.
HTML is a ____ generation language.
Fourth
Which programming approach enables classes of data to be given rules as to how it can be changed or utilized at runtime?
Object-Oriented programming
A small, limited version of a program that is used to test a solution is called
prototype
At which stage of programming project is the user manual usually written?
Implement and test the solution
The special term used to describe programming language files is
source code
Elizabeth is using compartmentalized groups of instructions as she creates a program. What approach is she using?
structured programming
Which of these is/are key steps in the Rapid Application Development (RAD) approach?

using second generation tools (2GL)
using prototypes early in the process
re-using existing code
All of these
b and c only
b and c only
What part of the development process could perhaps be best facilitated in a virtual environment, where the physical computer or network is protected and unaffected?
implementation and testing
Cindy is researching what is involved in the Accounts Receivable process. What step is she at in writing a computer program?
Analyze the problem
What name is given to the technique that breaks a large programming project into small problems?
the divide-and-conquer approach
To be processed by a computer, all multimedia elements must be
in a digital format
Which type of file can display an animated image?
GIF
Digital media is more efficient than analog media because
it can be reproduced many times with no loss of quality.
What term describes the cartoon-like images that can be used when creating greeting cards?
clip art
The process of reducing audio or video information to a data file is called
digitizing
A file format that is specific to an application is called
a native format
Which of these full names describe a format or formats used for digitizing photographs?

vector graphics
joint photographic experts group
tagged image file format
All of these
b and c only
b and c only
joint photographic experts group
tagged image file format
Which of the following graphics file formats is not common on x86, Windows-based computers:

.bmp
.jpg
.tiff
.pict
.png
.pict
What word describes a tool used by graphics applications to render images as rows of pixels?
raster
When a 3D graphics rendering program produces an object or an entire image without the shading, just a rendering of the position of shapes that could be shaded later the result is called a(n)
wireframe
In the computer game World of Warcraft, the often animated symbols used to represent players' characters on-screen is called a(n)
avatar
This term is used both to describe an active example of a class of data in an object-oriented program, and a rendering of an active 3D world in a computer game.
instance
The industry group that represents the interests of game software publishers, especially for combating piracy, is called the
Electronic Gaming Industry Consortium
The aspect ratio of a true high-definition video component is:
16:09
What is an image broken into before it can be used by a computer?
pixels
Which type of graphics file stores every pixel of the image that will be drawn on the screen?
bitmap
Which file format is rarely used in Web pages?
bitmap
Analysts estimate the number of pirated movie downloads per day in 2006 will top
1 million downloads
An electronic component that can digitally record video to a hard drive or optical disc, and may also serve as a high-definition tuner, is known by the abbreviation
DVR
Which type of file uses geometric shapes to produce images?
vector graphics
The integration of several different types of communication into one interface is called
multimedia
Which of the following is considered a multimedia element?

text
sound
video
All of these
b and c only
All of these
Which of the following graphics formats is not commonly used on Macintosh computers?
BMP
A graphics file can be transported to a different application by first
exporting the file to a standard format
What method is used to shorten the download time of large image files on the Web?
data compression
COPPA is a federal act designed to prohibit Web sites from
collecting or sharing personal data on children under 13
Which of these organizations is not involved in ensuring consumer privacy on the Web?

BBBOnline
TRUSTe
WebTrust
OPA
DMCA
DMCA
What is making it difficult for the FBI to use computers to fight crime?
public key encryption
Which group reached an agreement with the FTC that users should be told when their information will be used in a consumer profile?
Network Advertising Initiative
The school of thought stating that morals differ from one society to another is known as
moral relativism
Ethics are the same as
Internalized principles
Theresa, who lost her job last year, shoplifted a package of rolls to feed her young daughter. People in which ethical category would say, that's OK?
applied ethics
Marketers keep personal information about people's lifestyles and buying habits in
consumer profiles
A system of ethical principles that describes fairness and equality as an optimum state to be applied as a benchmark for behavior and strategy, is called
normative ethics
Computer ethics is a branch of
applied ethics
What visual cues on a Web site page tell you that your e-commerce transaction is secure
a locked padlock icon and a URL that begins with https:
What compelled ToySmart.com to break its consumer data privacy pledge?
The company went bankrupt.
The company that publicly demonstrated that data attached to cookies could not be used to circumvent privacy, is
DoubleClick
Widespread publication of whic type of public records can cause someone serious harm?
Criminal records, driver's license records and bankruptcy records
After further review, Carnivore has been renamed as
DCS1000
what source of information poses the greatest potential threat to personal privacy?
electronic databases
How can publicly available false information cause harm to individuals?
People don't have to be knowledgeable researchers to discover and disseminate it.
The belief that moral are eternal, unchanging laws is called
moral relativism
Which protocol protects e-commerce transactions with encryption techniques?
SSL
Web sites promise to keep consumer data confidential by
publishing privacy statements
What did the FBI's program called Carnivore do?
It read e-mail it was legally permitted to intercept.
Into which threat category do internet cookies fall?
commercial threat
One format for long, hexadecimal (base 16) ID numbers coded into hardware and software, is known as
Global Unique Identifiers
Which of the following do persistent cookies usually contain?

credit card numbers
passwords
preferences
All of these
b and c only
b and c only
passwords
preferences
The small data records containing behavioral data and Web session states, that Web servers store on clients' hard drives, are called
cookies
Which of the following is a common entry point of many IT careers?
sales and support
Which of these roles falls outside the purview of a database administrator?

application developer
Web server facilitator
technical support person
technical trainer
operations manager
Web server facilitator
Which of these high-ranking positions pays the least per annum?

Systems Analyst
System Programmer
Database Administrator
Web Administrator
Web administrator
Which IT area includes people with artistic backgrounds?
multimedia development
Which of the following is not a common characteristic of a programmer?
disinterest in anything outside the computer
At which of these job level can computer technicians be found?

part-time while still in school
full time, entry level with no experience
part-time in network administration
All of these
a and b only
All of these
Technical writers are often
English majors and/or systems analysts
Which of these is a Web master's responsibility?

maintaining load balancing among the Web servers
maintaining the Web site's interface with the database
using programming skills to maintain user interaction with the site
using programming skills to maintain user interaction with a site
All of these
a and c only
a and c only
maintaining load balancing among the Web servers

using programming skills to maintain user interaction with the site
The creation of new computer programs for commercial sale is called
software development
The process of testing new software products before they are released is called
quality assurance
Systems analyst, network administrator, and Web master are careers in the field of
application development
Who is responsible for the day to day operations of a database?
database administrator
Which job involves installing and repairing computer hardware and software as well as using interpersonal skills?
technical support
Mary wants to prepare for a career in which she can design a distribution management system. She is class president and has a part-time job providing technical support for two small businesses in town. What should she aim for?
systems analyst
Developers principally concerned with the creation of functionality for end users, are considered
application developers
When technical sales people get tired of selling, they often become
technical trainers
The product that is the result of QA testing is
deficiency report
Which of the following is not a primary responsibility of a network administrator?
dissecting source code
Which job title describes a person who primarily repairs printers, installs computer operating systems, and connects computers to make a network
technician
Which of these jobs is not an entry-level position?
network administrator
Which of these jobs currently has the highest average salary?

systems analyst
database administrator
QA tester
technical trainer
technical writer
systems analyst
What other hat must a systems analyst often wear when designing information systems?
Project manager
Technical sales people make most of their money
from their commissions
Which of these jobs is very people-centered and pays the most?

Technical writing
Technical training
Technical service
Technical support
Technical sales
Technical sales
Which of these jobs, on average, is the highest paid?

Technical trainer
Systems programmer
Technical writer
Multimedia developer
Quality assurance tester
Systems programmer
OOP
object-oriented programming
BCPL
Basic Combined Programming Language
DHTML
Dynamic Hypertext Markup Language
RPG
Report Program Generator
FORTRAN
FORmula TRANslator
VB
Visual Basic
RAD
rapid application development
XML
Extensible Markup Language
DOM
document object model
SDLC
software development life cycle
QA
quality assurance
WML
Wireless Markup Language
XHTML
Extensible Hypertext Markup Language
perl
practical extraction and report language
4GL
fourth-generation (programming) language
PLC
programmable logic controller
COM
Component Object Model
BASIC
Beginner's All-purpose Symbolic Instruction Code
JVM
Java Virtual Machine
COBOL
COmmon Business-Oriented Language
HTML
Hypertext Markup Language
CASE
computer-aided software engineering
VR
virtual reality
RL
real life
GIF
graphics interchange format
WoW
World of Warcraft
CG FX
computer graphic special effects
DVR
digital video recorder
LD
link death; your internet connection failed
ESA
Entertainment Software Association
MPEG
Moving Picture Experts Group
AFK
away from keyboard
TIFF
tag image file format
HDTV
high-definition television
MMO
massively multiplayer online
MIDI
Musical Instrument Digital Interface
JPEG
Joint Photographic Experts Group
PNG
Portable Network Graphics
AI
artificial intelligence
PvP
Player versus player; an area that allows players to harm one another.
BMP
bitmap
EPS
encapsulated PostScript
CFR
computerized facial recognition
URL
Uniform (or Universal ) Resource Locator
FTC
Federal Trade Commission
CIPA
Children's Internet Protection Act
GUID
Global Unique Identifier
EUCD
European Union Copyright Directive
NSA
National Security Agency
ATM
Automated Teller Machine
NET Act
No Electronic Theft Act
BSA
Business Software Alliance
OPA
Online Privacy Alliance
FBI
Federal Bureau of Investigation
NFB
National Federation of the Blind
SSL
Secure Sockets Layer
MMORPG
Massively multiplayer online role-playing game
WIPO
World Intellectual Property Organization
TCPA
Telephone Consumer Protection Act of 1991
AUP
Acceptable use policy
GPS
Global Positioning System
DMCA
Digital Millennium Copyright Act
SPA
Software Publishers Association
CAN-SPAM Act
Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003
IP
intellectual property
EOUSA
Executive Office for United States Attorneys
DHS
United States Department of Homeland Security
HIPPA
Health Insurance Portability and Accountability Act of 1996
FISMA
Federal Information Security Management Act of 2002
GUI
graphical user interface
USA PATRIOT Act
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
COPPA
Children's Online Privacy Protection Act of 1998
ISP
Internet service provider
TLS
Transport Layer Security
AOL
America Online
WAN
Wide Area Network
CCIP
Cisco Certified Internetworking Professional
CCSP
Cisco Certified Security Professional
MCSD
Microsoft Certified Solution Developer
QA
Quality Assurance
MCAD
Microsoft Certified Application Developer
CCDA
Cisco Certified Design Associate
TIA
Telecommunications Industry Association
CNA
Certified Novell Administrator
MCSE
Microsoft Certified Systems Engineer
MCDBA
Microsoft Certified Database Administrator
MCSA
Microsoft Certified Systems Administrator
CCNA
Cisco Certified Network Associate
MCP
Microsoft Certified Professional
MIT
Massachusetts Institute of Technology
CIS
Computer Information Systems
OCDBA
Oracle Certified Database Administrator
CTP
Convergence Technologies Professional
CNE
Certified Novell Engineer
Comp TIA
Computing Technology Industry Association
OCAD
Oracle Certified Application Developer
LAN
Local Area Network
MOS
Microsoft Office Specialist
IT
Information Technology