Term
Bandwidth (pg. 52): (channel capacity) |
|
Definition
An expression of how much data- text, voice, and so on- can be sent through a communications channel in a given amount of time |
|
|
Term
|
Definition
Very high speed connections |
|
|
Term
Internet access provider (pg. 53) |
|
Definition
The regional, national, or wireless organization or business that connects you to the internet. |
|
|
Term
Integrated Services Digital Network (pg. 55) |
|
Definition
Consists of hardware and software that allow voice, video, and data to be communicated over traditional copper-wire telephone lines |
|
|
Term
Digital subscriber line (DSL) (pg. 55) |
|
Definition
Uses regular phone lines, a DSL modem, and special technology to transmit data in megabits per second |
|
|
Term
|
Definition
Essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps |
|
|
Term
|
Definition
Connects a personal computer to a cable-TV system that offers an internet connection |
|
|
Term
Communications satellite (pg. 57) |
|
Definition
A space station that transmits radio waves called microwaves from Earth-based stations |
|
|
Term
Wireless network (pg. 58) |
|
Definition
Uses radio waves to transmit data |
|
|
Term
|
Definition
The name given to any of several standards- so-called 802.11 standards- set by the Institute of Electrical and Electronic Engineers (IEEE) for wireless transmission |
|
|
Term
Access point, or hot spot (pg. 58) |
|
Definition
A station that sends and receives data to and from a Wi-Fi network; public access to Wi-Fi networks |
|
|
Term
|
Definition
Stands for “third generation”; loosely defined as high-speed wireless technology that does not need access points because it uses the existing cell phone system |
|
|
Term
Internet service provider (ISP) (pg. 58) |
|
Definition
A local, regional, or national organization that provides access to the internet |
|
|
Term
Network access point (NAP) (pg. 61) |
|
Definition
A routing computer at a point on the internet where several connections come together |
|
|
Term
Internet backbone (pg. 62) |
|
Definition
High-speed, high-capacity transmission lines that use the newest communications technology to transmit data across the internet |
|
|
Term
|
Definition
Set of rules that computers must follow to transmit data electronically |
|
|
Term
TCP/IP (pg. 62): (Transmission Control Protocol/Internet Protocol) |
|
Definition
The protocol that enables all computers to use data transmitted on the internet |
|
|
Term
|
Definition
Fixed-length blocks of data for transmission |
|
|
Term
Internet Protocol (IP) address (pg. 63) |
|
Definition
Uniquely identifies every computer and device connected to the internet |
|
|
Term
ICANN (pg. 63): (Internet Corporation for Assigned Names and Numbers) |
|
Definition
Was established to regulate human-friendly internet domain names- those addresses ending with .com, .org, .net, and so on, that overlie IP addresses and identify the website type |
|
|
Term
Universal Resource Locator (URL) (pg. 66) |
|
Definition
A string of characters that points to a specific place of information anywhere on the web |
|
|
Term
HyperText Transfer Protocol (HTTP) (pg. 67) |
|
Definition
The communications rules that allow browsers to connect with web servers |
|
|
Term
|
Definition
Simply a location on the internet, the particular web server |
|
|
Term
Hypertext Markup Language (HTML) (pg. 68) |
|
Definition
The set of special instructions (called “tags or “markups”) that are used to specify document structure, formatting, and links to other multimedia documents on the web |
|
|
Term
Hypertext link, or hyperlinks, hotlinks, or links (pg. 69) |
|
Definition
Connections to other documents or web pages that contain related information; a word or phrase in one document becomes a connection to a document in a different place |
|
|
Term
Web portal (pg. 73): (portal) |
|
Definition
A type of gateway website that functions as an “anchor site” and offers a broad array of resources and services, online shopping malls, email support, community forums, current news and weather, stock quotes, travel information, and links to other popular subject categories |
|
|
Term
|
Definition
The subject word or words of the topic you wish to find |
|
|
Term
|
Definition
Programs that enable you to ask questions or use keywords to help locate information on the web |
|
|
Term
|
Definition
Do-it-yourself labels that people can put on anything found on the internet, from article to photos to videos |
|
|
Term
|
Definition
You send and receive messages by interacting via a browser with a website |
|
|
Term
File transfer protocol (FTP) (pg. 88) |
|
Definition
A software standard for transferring files between computers with different operating systems. You can connect to a remote computer called an FTP site and transfer files to your own microcomputer’s hard disk via TCI/IP over the internet |
|
|
Term
Real-time chat (RTC) (pg. 90) |
|
Definition
Participants have a typed discussion while online at the same time |
|
|
Term
Internet telephony, or voice over internet protocol (VoIP) phoning (pg. 92): |
|
Definition
Using the net to make phone calls, either one to one or for audio-conferencing |
|
|
Term
Plug-in (pg. 93): (player or viewer) |
|
Definition
A program that adds a specific feature to a browser, allowing it to play or view certain files |
|
|
Term
|
Definition
A program that adds a specific feature to a browser, allowing it to play or view certain files Small programs (software) that can be quickly downloaded and run by most browsers |
|
|
Term
|
Definition
A Complex programming language that enables programmers to create animated and interactive web pages |
|
|
Term
|
Definition
Software that automatically downloads information to personal computers |
|
|
Term
|
Definition
Customized text, video, and audio are sent to you automatically on a regular basis |
|
|
Term
RSS newsreader or RSS aggregator (pg. 96) |
|
Definition
Programs that scour the web, sometimes hourly or more frequently, and pull together in one place web “feeds” from several websites |
|
|
Term
Extensible markup language (XML) (pg. 96) |
|
Definition
A web-document tagging and formatting language that is an advance over HTML and that two computers can use to exchange information |
|
|
Term
|
Definition
|
|
Term
E-commerce, or electronic commerce (pg. 97) |
|
Definition
Conducting business activities online |
|
|
Term
B2B (business-to-business) commerce (pg. 97) |
|
Definition
The electronic sale or exchange of goods and services directly between companies, cutting out traditional intermediaries |
|
|
Term
|
Definition
The forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source |
|
|
Term
|
Definition
(1) The sending of a forged email that (2) directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. The purpose of the fraudulent sender is to “phish” for, or entice people to share, their personal, financial, or password data |
|
|
Term
|
Definition
Thieves implant malicious software on a victim’s computer that redirects the user to an imposter web page even when the individual types the correct address into his or her browser. |
|
|
Term
|
Definition
Little text files- such as your log-in name, password, and preferences- left on your hard disk by some websites you visit. The websites retrieve the data when you visit again |
|
|
Term
|
Definition
Deceptive software that is surreptitiously installed on a computer via the web; once installed on your hard disk, it allows an outsider to harvest confidential information |
|
|
Term
Adware (pg. 102): (pop-up generators) |
|
Definition
A kind of spyware that tracks web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads |
|
|
Term
Browser hijackers (pg. 102) |
|
Definition
Change settings in your browser without your knowledge, often changing your browser’s home page and replacing it with another web page |
|
|
Term
Search hijackers (pg. 102) |
|
Definition
Intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run |
|
|
Term
Key loggers (pg. 103): (keystroke loggers) |
|
Definition
Can record each character you type and transmit that information to someone else on the internet, making it possible for strangers to learn your passwords and other information |
|
|
Term
1. Contrast dial-up connections with ISDN, DSL, and T1 connections. (pgs. 53-56) |
|
Definition
ISDN: Consists of hardware and software that allow voice, video, and data to be communicated over traditional copper-wire telephone lines. It is the slowest of high-speed internet options DSL: Uses regular telephone lines, a DSL modem, and special technology to transmit data in megabits per second. You must live within 3.3 miles of a phone company central switching office T1 line: Essentially a traditional trunk line that carries 24 normal telephone circuits and has a transmission rate of 1.5 Mbps. This is the quickest high-speed internet option |
|
|
Term
2. Explain how a cable modem differs from other types of connections. (pgs. 56-57) |
|
Definition
Cable modem: Connects a personal computer to a cable-TV system that offers an internet connection |
|
|
Term
3. Contrast the three types of wireless connections. (pgs. 57-58) |
|
Definition
Communications satellite: A space station that transmits radio waves called microwaves from earth-based stations Wi-Fi: The name given to any of several standards- so called 802.11 standards- set by the Institute of Electrical and Electronic Engineers (IEEE) for wireless transmission. Wireless 3G: High-speed wireless technology that does not need access points because it uses the existing cellphone system |
|
|
Term
4. Contrast the three types of internet access providers. (pgs. 58, 60) |
|
Definition
Internet service provider: A local, regional, or national organization that provides access to the internet Commercial online service: Members-only company that provides not only internet access but other specialized content as well (i.e. AOL, MSN) Wireless internet service: Enables users with computers containing wireless modems to gain access to the internet |
|
|
Term
5. How does TCP/IP handle data transmission on the internet? (pgs. 62-63) |
|
Definition
A set of rules that computers must follow to transmit data electronically Determines how the sending device will indicate that it has finished sending a message and how the receiving device will indicate that it has received the message Breaks the data in a message into separate packets |
|
|
Term
6. The Institutes’ web address is http://www.aicpcu.org. Explain the components of this address. (pgs. 66-67) |
|
Definition
http://: protocol www.aicpu.org : domain name (web server name) |
|
|
Term
7. What is a web portal? What are its useful features? (pgs. 73-74) |
|
Definition
A type of gateway website that functions as an “anchor site” and offers a broad array of resources and services Online shopping malls, email support, community forums, current news and weather, stock quotes, travel information, and links to other popular subject categories |
|
|
Term
8. Describe each of the four types of web search tools. (pgs. 75-76) |
|
Definition
Keyword index: Allows you to search for information by typing one or more keywords, and the search engine then displays a list of web pages, or “hits”, that contain those key words Subject directories: Allows you to search for information by selecting lists of categories or topics Metasearch engine: Allows you to search several search engines simultaneously Specialized search engine: Help locate specialized subject matter, such as material about movies, health, and jobs |
|
|
Term
9. Contrast email programs and web-based email. (pgs. 81-82) |
|
Definition
Email program: Enables you to send email by running email software on your computer, which interacts with an email server at your internet access provider to send and receive email Web-based email: You send and receive messages by interacting via a browser with a website |
|
|
Term
10. Erin Jones’s email address is erinj@aitstudent.org. Explain the components of this address. (pg. 83) |
|
Definition
erinj: User name (User ID) aitstudent.org: Domain name aitstudent: Domain (location) .org: Top-level domain (domain type) |
|
|
Term
11. Contrast instant messaging (IM) with email and real-time chat. (pgs. 86-88, 90) |
|
Definition
Instant messaging (IM): Any user on a given email system can send a message and have it pop up instantly on the screen of anyone else logged onto that system Real-time chat: participants have a typed discussion (“chat”) while online at the same time Unlike instant messaging (IM), which tends to involve one-on-one conversation, real-time chat usually involves several participants. |
|
|
Term
12. Describe the basic rules of netiquette. (pgs. 91-92) |
|
Definition
Consult FAQs Avoid flaming Don’t SHOUT Be careful with jokes Avoid sloppiness, but avoid criticizing others’ sloppiness Don’t send huge file attachments, unless requested When replying, quote only the relevant portion |
|
|
Term
13. Contrast VoIP phoning with a traditional phone connection. (pgs. 92-93) |
|
Definition
Using the net, rather than a traditional phone line, to make phone calls, either one to one or for audio-conferencing |
|
|
Term
14. Describe the tools needed for viewing multimedia on the web. (pgs. 93-95) |
|
Definition
Plug-in: (player or viewer) A program that adds a specific feature to a browser, allowing it to play or view certain files |
|
|
Term
15. Describe webcasting, blogging, and podcasting. (pgs. 95-97) |
|
Definition
Webcasting: Customized text, video, and audio are sent to you automatically on a regular basis Blogging: Diary-style web page Podcasting: Involves the recording of internet radio or similar internet audio programs |
|
|
Term
16. Describe the benefits of e-commerce. (pgs. 97-99) |
|
Definition
It is not only widening consumers’ choice of products and services but also creating new businesses and compelling established businesses to develop internet strategies |
|
|
Term
17. Explain how an individual or organization can protect against the following: (pgs. 99-103) |
|
Definition
a. Snooping Install software on your computer that encodes and decodes messages Don’t put any sensitive or embarrassing information in your email
b. Spoofing, phishing, and pharming Be suspicious of any email that directs you to a website that requests confidential information. Make sure you go to special secure web pages. c. Cookies Delete your cookies d. Spyware Download an anti-spyware program to your computer |
|
|