Term
|
Definition
(Center for European Nuclear Research) where Tim Berners-Lee invented a standard programming language |
|
|
Term
|
Definition
|
|
Term
Uniform Research Locators |
|
Definition
URL) is the address of a website and have components that make it up |
|
|
Term
Browser application software |
|
Definition
what displays the website |
|
|
Term
|
Definition
A good design of a website can be a customer's initial impression of a business |
|
|
Term
|
Definition
also call "favorites"; will catalog your favorite URL's that the user has visited or plans to visit, so the user doesn't have to remember the page URL. |
|
|
Term
|
Definition
are text files sent to a browser and then sent back unchanged by the browser to the originating server. Used for tracking and maintaining specific information. |
|
|
Term
|
Definition
are client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page. |
|
|
Term
|
Definition
settings to disallow popups |
|
|
Term
|
Definition
|
|
Term
|
Definition
is high data-transmission rate Internet connection. |
|
|
Term
|
Definition
a search engines organized into directories like medicine or automotive so the user can search only within a particular area. |
|
|
Term
|
Definition
need a very capable management team, a well-organized business structure, good customer service, inventory controls, and much more. |
|
|
Term
|
Definition
e-commerce websites need to provide an easy, secure way to handle transactions while remaining attractive and very easy to use and navigate. |
|
|
Term
|
Definition
carbon copy; option in emailing that offers the ability to copy more than one recipient and lets all of the recipients know who else has received the same email. |
|
|
Term
|
Definition
blind carbon copy; distribution option works like the carbon copy except none of the recipients know who else received the same email, or whether anyone other than them received it at all. |
|
|
Term
|
Definition
Terms of Service Agreement; email server owners rules that specifically outlines e-mail usage and protocols. Don't say or type anything in an email that you wouldn't be willing to say in public. |
|
|
Term
|
Definition
encompasses the general use of equipment to provide voice communication over distances, specifically by connecting telephones to each other |
|
|
Term
|
Definition
invented a standard programming language called HTML and the protocol to move information through the Internet called HTTP. |
|
|
Term
|
Definition
The ability to link various media and devices, thereby enhancing communication and improving access to information. |
|
|
Term
|
Definition
is the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. |
|
|
Term
|
Definition
is often someone who attempts to evade or disable a computer's security measures, and then steals computer resources at their leisure |
|
|
Term
|
Definition
is extremely easy to breach, especially by a seasoned hacker. |
|
|
Term
|
Definition
are the most uncomplicated type of Internet fraud. Involve a buyer typically in another country that approaches merchants via spam and asks if they can pay for shipping with a credit card. Once the order is shipped, the credit card is cancelled and the shipping company receives a charge back and loses all of their money from the other |
|
|
Term
|
Definition
a copy of a webpage was sent from the book seller's server to your computer (client). The server also sent a small text file called a cookie that the user is typically unaware of. |
|
|
Term
|
Definition
when experts extract useful data and information from recorded data like a cookie |
|
|
Term
|
Definition
are a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the web. |
|
|
Term
|
Definition
|
|
Term
|
Definition
(Advanced Research Project Agency Network); one of the precursors to today's Internet. |
|
|
Term
|
Definition
(Hypertext Markup Language); standard programming language |
|
|
Term
|
Definition
is application software that provides an interface which lets a user display and interact with text, images, and other information located on the WWW. |
|
|
Term
|
Definition
the protocol to move information through the Internet |
|
|
Term
|
Definition
(World Wide Web); resides on the Internet |
|
|
Term
|
Definition
|
|
Term
|
Definition
what the Internet network is called; a computer on a network that stores Web pages is called the server or host, and the computer on the network tat requests those Web pages is called a client. A computer can be both a client and a server at the same time. |
|
|
Term
|
Definition
(Internet Protocol): an address system to identify and communicate throughout the network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
people that produce a website |
|
|
Term
|
Definition
is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the WWW or request it again from the originating server |
|
|
Term
Graphic files (GIF and JPEG) |
|
Definition
how web browsers display images; (Graphics Interchange Format) and (Joint Photographic Expert Group) |
|
|
Term
|
Definition
are client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page. |
|
|
Term
|
Definition
programs that enable users to access a certain type of data |
|
|
Term
|
Definition
The ability to link various media and devices, thereby enhancing communication and improving access to information. |
|
|
Term
ISP (Internet Service Provider) |
|
Definition
is a business or organization that provides people a way to access the Internet and WWW. |
|
|
Term
|
Definition
is a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria. Ex. Yahoo, Google, and AltaVista |
|
|
Term
|
Definition
look and work like keyword searches, but return the results of many search engines at once and eliminate duplicates hits |
|
|
Term
E-Commerce (Electronic Commerce) |
|
Definition
is the distributing, buying, selling, advertising, and marketing of goods or services over the Web. |
|
|
Term
|
Definition
is (definition of e-commerce) to other businesses; inclined to take place within specific categories |
|
|
Term
|
Definition
is where commercial organizations sell to consumers. |
|
|
Term
|
Definition
involves e-commerce between consumers, usually facilitated by some third party. |
|
|
Term
|
Definition
research any business needs to ask for success |
|
|
Term
Streamline Business Process |
|
Definition
how you do business on the Web |
|
|
Term
|
Definition
allows for website reengineering, and even an entire business facelift far faster than conventional businesses. |
|
|
Term
|
Definition
when the browser's settings are modified by Malware |
|
|
Term
|
Definition
is software designed to damage a computer's system without the owner's knowledge. |
|
|
Term
|
Definition
is like a virus in that it spreads quickly and is extremely harmful, but does not need to attach itself to an existing program. They are self-replicating, they harm networks |
|
|
Term
|
Definition
is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a users system. |
|
|
Term
|
Definition
is software which routinely displays advertising to a computer system after the software is installed, usually without the user's consent. |
|
|
Term
|
Definition
is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it. |
|
|
Term
|
Definition
watch out for stuff like phishing |
|
|
Term
VoIP (Voice over Internet Protocol) |
|
Definition
is the routing of voice conversations, or typically, phone calls over the Internet. VolP phone system that uses the Internet as its phone lines instead of traditional phone lines. |
|
|
Term
Most important part of a website |
|
Definition
|
|
Term
Second most important part of a website |
|
Definition
|
|
Term
Internet Explorer has poor security because... |
|
Definition
it's integrated into your Microsoft OS. Firefox is better because it's a standalone program. |
|
|
Term
|
Definition
is the most important on the internet |
|
|
Term
|
Definition
Hardware used in intranet |
|
|
Term
|
Definition
is concerned with risk management, confidentiality, integrity and the availability of the electronic information that is processed and stored on a computing system. |
|
|
Term
|
Definition
is the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. |
|
|
Term
DoS attack: (Denial of Service attack) |
|
Definition
most harmful; is an attempt to make a computer or any of its resources unavailable to its intended users |
|
|
Term
Reverse Phishing/Keylogging |
|
Definition
a relatively newer form of malware, key logging is when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard |
|
|
Term
|
Definition
operating system protecting their user's operating systems by automatically offering online updates that have been identified as security threats in the operating system itself. |
|
|
Term
|
Definition
is actually a very broad term that refers to any fraudulent activity regarding online activity. Typically, this type of fraud is through criminal solicitation followed by transferring the proceeds to the perpetrators. most common is stealing credit card data leads to identity theft |
|
|
Term
|
Definition
a criminal in a public place will simply glance over their victims' shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number |
|
|
Term
Facebook is worth billions because... |
|
Definition
it has a large database online |
|
|