Term
|
Definition
marketers checking in with the voice of the crowd |
|
|
Term
QR (quick response) codes |
|
Definition
those funny black and white square pixels things |
|
|
Term
|
Definition
the process of searching huge amounts of data with the hope of finding a pattern |
|
|
Term
|
Definition
developing systems that can recognize and simulate human emotions |
|
|
Term
4 major functions of a computer |
|
Definition
input process output storage |
|
|
Term
|
Definition
8 binary digits (bits) combine to create a byte
each letter, number, and special character is represented by a byte (or eight bits -> 0s & 1s) |
|
|
Term
|
Definition
width-to-height proportion of a monitor |
|
|
Term
|
Definition
inkjet, laser
sprays ink or uses laser beams to transfer marks onto the paper |
|
|
Term
|
Definition
has tiny hammer-like keys that strike the papaer through an inked ribbon to make marks on the paper. legacy tech* |
|
|
Term
|
Definition
main circuit board that contains the cnetral electronic components, including its CPU, memory, and many circuit boards |
|
|
Term
|
Definition
random access memory
volatile storage
programs ad data the computer is currently using is stored |
|
|
Term
|
Definition
read-only memory
nonvolatile storage location
stores all the instructions the computer needs to start |
|
|
Term
|
Definition
central processing unit "processor"
controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions |
|
|
Term
|
Definition
allows you to connect up to six different peripherals to your computer |
|
|
Term
|
Definition
transmission lines with the fastest speeds |
|
|
Term
business to consumer e-commerce B2C |
|
Definition
transactions take place btw business and consumer |
|
|
Term
business-to-business e-commerce B2B |
|
Definition
transactions occur when businesses buy and sell goods and services to other businesses |
|
|
Term
consumer-to-consumer e-commerce C2C |
|
Definition
transaction occur when consumers sell to each other through sites like ebay |
|
|
Term
|
Definition
evolving extension of the web in which data is defined in such a way to make it more easily processed by computers. |
|
|
Term
|
Definition
the suffix in the domain name .edu .ca |
|
|
Term
timeline of personal computer |
|
Definition
1975: altair 1976: Apple I 1977: Apple II 1977: Commodore Pet 1977: TRS-80 1981: Osbourne 1981: IBM PC |
|
|
Term
timeline of personal computer |
|
Definition
1975: altair 1976: Apple I 1977: Apple II 1977: Commodore Pet 1977: TRS-80 1981: Osbourne 1981: IBM PC |
|
|
Term
|
Definition
Beginners All-Purpose Symbolic Instruction Code
easy to learn computer language |
|
|
Term
|
Definition
disc operating system
OS that controlled the first Apple computers |
|
|
Term
|
Definition
operating systems used in early IBM PCs |
|
|
Term
|
Definition
first electronic spreadsheet program 1978 |
|
|
Term
|
Definition
first word processing application 1978 |
|
|
Term
|
Definition
Best DOS-based word processor, eventually sold to Novell and later acquired by Corel 1980 |
|
|
Term
|
Definition
added integrated charting, plotting, and database capabilities to spreadsheet software 1983 |
|
|
Term
|
Definition
introduced in the pages of PC World magazine on the first magazine-inserted demo disk 1983 |
|
|
Term
|
Definition
one of the first spreadsheets to use a graphical user interface 1985 |
|
|
Term
|
Definition
the first desktop publishing software 1985 |
|
|
Term
graphical user interface GUI |
|
Definition
allowed users to interact with computer more easily
developed by photocopier manufacturer Xerox for Alto PC |
|
|
Term
|
Definition
1983, Apple, first PC with GUI
features: windows, drop-down menu, icons, file system, mouse
price too high |
|
|
Term
|
Definition
1984, apple PC, Lisa ++ at half the price |
|
|
Term
|
Definition
|
|
Term
|
Definition
1995, IBM web browser integrated with Microsoft Office software |
|
|
Term
|
Definition
first microsoft OS designed to be principally a GUI OS |
|
|
Term
|
Definition
1994, web browser, predominant player in web browser software |
|
|
Term
|
Definition
first accurate mechanical calculator 1642 |
|
|
Term
|
Definition
machine that automated the weaving of complex patterns
stiff cards with punched holes to automate the process, punch cards used in early computers |
|
|
Term
|
Definition
based on difference machine
Babbage - father of computing
first automatic calculator
never actually developed, but components from the detailed plans were used in computers. |
|
|
Term
|
Definition
huge steam powered mechanical calculator designed to print astronomical tables |
|
|
Term
Hollerith tabulating machine |
|
Definition
first punch-card machine
company was the precursor to IBM |
|
|
Term
|
Definition
1936, mechanical calculator
first computer to include certain important components |
|
|
Term
Antanasoff-Berry Computer ABC |
|
Definition
first electrically powered digital computer 1939
vacuum tubes instead of switches to store data
first computer to use the binary system |
|
|
Term
|
Definition
Mark series of computers designed for the U.S. Navy for ballistics and gunnery calculations.
add, subtract, multiply, divide |
|
|
Term
|
Definition
a program that translates English-language instructions into computer instructions |
|
|
Term
|
Definition
1936 abstract computer model that could perform logical operations
not a real machine but a hypothetical model that mathematically defined a mechanical procedure (or algorithm)
infinite paper tape the precursor to RAM |
|
|
Term
|
Definition
electronic numerical integrator and computer
US gov sponsored machine designed to calculate the settings used for weapons 1944-1955 |
|
|
Term
|
Definition
universial automatic computer
first commercially successful electronic digital computer
magnetic tape instead of punch cards |
|
|
Term
second generation computers |
|
Definition
comuters that use transistors |
|
|
Term
third generation computers |
|
Definition
computers with early integrated circuit (small chip capable of containing thousands of transistors) |
|
|
Term
|
Definition
computers that use a microprocessor (CPU, 1971, Intel, small chip containing millions of transistors)
Intel Core i7 (billions of transistors) |
|
|
Term
Software as a Service SaaS |
|
Definition
the vendor hosts the software online and you access and use the software over the Internet without having it installed on your computer |
|
|
Term
|
Definition
small program that groups a series of commands so that they will run as a single command |
|
|
Term
computer aided design CAD programs |
|
Definition
3-D models, technical drawings, automated designs |
|
|
Term
|
Definition
small program that performs many of the general housekeeping tasks |
|
|
Term
|
Definition
embedded systems
program with a specific purpose, usually for machinery that performs a repetitive series of tasks in an exact amount of time |
|
|
Term
|
Definition
lets more than one user access the computer system at a time by handling and prioritizing requests from multiple users |
|
|
Term
|
Definition
multiuser, multitaksing OS that is used as a network OS |
|
|
Term
|
Definition
|
|
Term
|
Definition
a special numerical code that prioritizes the request |
|
|
Term
|
Definition
the process of optimizing RAM storage by borrowing hard drive space |
|
|
Term
|
Definition
condition of excessive paging/swapping with virtual memory
fix problem by adding RAM |
|
|
Term
|
Definition
a software and hardware standard designed to facilitate the installation of new hardware in Pcs by including in the OS the drivers these devices need in order to run |
|
|
Term
application programming interface API |
|
Definition
the blocks of code that application software needs in order to interact with the CPU |
|
|
Term
|
Definition
no universal moral truth
moral principles dictated by cultural tastes and customs |
|
|
Term
|
Definition
God is all-knowing and sets moral standards |
|
|
Term
|
Definition
actions are judged solely by consequences
greater good |
|
|
Term
|
Definition
|
|
Term
|
Definition
duty-based
morals should apply to everyone equally |
|
|
Term
|
Definition
describes the pace at which CPUs improve
CPU capacity will double every 2 years |
|
|
Term
|
Definition
1. fetches 2. decodes 3. executes 4. stores |
|
|
Term
|
Definition
provides quicker processing of information by enabling a new set of instructions to start executing before the previous has been finished |
|
|
Term
|
Definition
Windows memory management
monitors the applications you use the most and preloads them into your system memory so they'll be ready to be used |
|
|
Term
|
Definition
redundant array of independent disks
a set of strategies for using more than one drive in a system
RAID 0: stores half on each disk RAID 1: stores on both disks |
|
|
Term
|
Definition
electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers |
|
|
Term
|
Definition
2+ computers that are connected via software and hardware so they can communicate |
|
|
Term
|
Definition
each device connected to a network |
|
|
Term
|
Definition
electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers |
|
|
Term
|
Definition
2+ computers that are connected via software and hardware so they can communicate |
|
|
Term
|
Definition
each device connected to a network |
|
|
Term
|
Definition
bandwidth
the maximum speed at which data can be transmitted between two nodes |
|
|
Term
|
Definition
the actual speed of transfer that is achieved between two nodes on a network |
|
|
Term
|
Definition
used for communication among devices close to one person |
|
|
Term
|
Definition
nodes are all located within a small geographical area |
|
|
Term
metropolitan area network |
|
Definition
large network desgined to provide access to a specific geographic area, such as a city |
|
|
Term
|
Definition
spans a large physical distance
e.g. the internet |
|
|
Term
|
Definition
central administration
client is a computer on which users accomplish tasks and make requests
servers is the computer that provides information or resources to the client computers as well as central admin for network functions such as printing |
|
|
Term
peer-to-peer (P2P) network |
|
Definition
local administration
each node can communicate directly with every other node
most common home network |
|
|
Term
|
Definition
made up of copper wires that are twisted around each other and surrounded by a plastic jacket |
|
|
Term
unshielded twisted-pair cable |
|
Definition
used for networks
four pairs of wires twisted around each other |
|
|
Term
|
Definition
single copper wire surrounded by layers of plastic |
|
|
Term
|
Definition
plastic or glass fibers that transmit data at extremely fast speeds |
|
|
Term
|
Definition
network adapter integrated into many devices |
|
|
Term
|
Definition
transmits internet over coaxial cables that also transmit cable television signals |
|
|
Term
digital subscriber line DSL |
|
Definition
twisted-pair cable, same as for telephones |
|
|
Term
network attached storage (NAS) device |
|
Definition
specialized devices designed to store and manage all network data |
|
|
Term
|
Definition
uses small radio transmitters instead of wireless routers as its network nodes |
|
|
Term
network attached storage (NAS) device |
|
Definition
specialized devices designed to store and manage all network data |
|
|
Term
|
Definition
uses small radio transmitters instead of wireless routers as its network nodes |
|
|
Term
|
Definition
service set identifier
name of the network |
|
|
Term
|
Definition
base-16 number system
more convenient for programmers compared to binary (base 2) and base 10. |
|
|
Term
|
Definition
American Standard for Information Interchange
represents each letter or character as an 8-bit (1 byte) binary code |
|
|
Term
|
Definition
new encoding scheme that uses 18 bits. First 128 characters of Unicode are identical to ASCII |
|
|
Term
|
Definition
a technique that allows the CPU to work on more than one instruction at the same time |
|
|
Term
|
Definition
a large network of computers, with each computer working on a portion of the same problem simultaneously |
|
|
Term
analog-to-digital converter chips |
|
Definition
converts your voice's sound waves into digital signals |
|
|
Term
|
Definition
specialized chip in a smart phone that compresses digital data |
|
|
Term
|
Definition
compression/decompression
a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space |
|
|
Term
|
Definition
replicates itself onto a hard rive's master boot record, virus loaded into memory upon boot
often transmitted by flash drive left in an USB port |
|
|
Term
|
Definition
virus triggered when certain logical conditions are met such as opening a file or starting a program a number of times |
|
|
Term
|
Definition
a virus that is triggered by the passage of time or on a certain date |
|
|
Term
|
Definition
often called a virus, but different
works independently of host file execution, more active in spreading itself |
|
|
Term
|
Definition
series of commands-actually a miniprogram-that is executed without your knowledge
some scripts are legitimate, some malicious |
|
|
Term
|
Definition
virus that attaches itself to a document that uses macro (short series of commands that usually automates repetitive tasks) |
|
|
Term
|
Definition
run a program that searches for common types of data files, such as word, and compresses them using a complex encryption key that renders them unusable. Then they charge you for a program to decrypt them.
can trace payments |
|
|
Term
|
Definition
changes its own code or periodically rewrites itself to avoid detection |
|
|
Term
|
Definition
infect multiple files types in an effort to fool the antivirus software that is looking for it |
|
|
Term
|
Definition
a portion of the virus code that;s unique to a particular virus |
|
|
Term
|
Definition
malicious websites set-up to attack your computer by downloading harmful software onto your computer
keeping your OS up to date helps prevent |
|
|
Term
white-hat/ethical hackers |
|
Definition
break into systems for non-malicious reasons such as to test security |
|
|
Term
|
Definition
break into systems to destroy information or for illegal gain |
|
|
Term
|
Definition
illegally break into systems to flaunt their expertise or in attempt to sell their services in security breaches |
|
|
Term
|
Definition
sniffer
a program developed by hackers that looks at each packet as it travels over the internet |
|
|
Term
|
Definition
a program that appears to be something useful or desirable, but while it runs, it does something malicious in the background |
|
|
Term
|
Definition
programs, or sets of programs, designed to allow hackers to gain access to your computer and take control of it without your knowledge
most common thing that happens in the background of a trojan |
|
|
Term
denial of service (DoS) attacks |
|
Definition
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer system he has taken over by a zombie |
|
|
Term
|
Definition
large group of software programs that runs autonomously on zombie computers.
often used to coordinate distributed denial-of-service attacks |
|
|
Term
|
Definition
virtual communication gateways or paths that allow a computer to organize requests for information |
|
|
Term
|
Definition
a piece of data attached to a photo that indicates your latitude and longitude when you took the photo |
|
|
Term
|
Definition
a software program or hardware device designed to protect computers from hackers
1. block access to logical ports 2. keeping your computer's network address secure |
|
|
Term
|
Definition
firewalls an be configured to filter out packets sent to specific logical ports |
|
|
Term
|
Definition
firewalls are configured to ignore requests that originate from the internet asking for access to certain ports |
|
|
Term
network address translation |
|
Definition
firewalls use this process to assign internal IP addresses to a network, hackers should not be able to access it. |
|
|
Term
|
Definition
small tect files that some websites automatically store on your hard drive when you visit them
pose no security threat |
|
|
Term
|
Definition
using a work computer for non-work activities while you're being paid to do your job |
|
|
Term
|
Definition
any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information |
|
|
Term
|
Definition
social engineering
creates a scenario that sounds legitimate enough that someone will trust you
phishing most common form |
|
|
Term
|
Definition
lures internet users to reveal personal info such as credit card #s, SIN, etc... |
|
|
Term
|
Definition
more insidious than phishing
malicious code is planted on your computer, either by viruses or visiting malicious websites, which then alters your browser's ability to find web addresses
end up at a fake website that look legitimate but is designed to steal info |
|
|
Term
|
Definition
type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus. you're then directed to a website to buy bogus antivirus software to remove it |
|
|
Term
system development life cycle SDLC |
|
Definition
1. problem and opportunity identification 2. analysis (program specification) 3. design (data-flow diagrams) 4. development 5. testing and installation 6. maintenance and evaluation |
|
|
Term
system development life cycle SDLC |
|
Definition
1. problem and opportunity identification 2. analysis (program specification) 3. design (data-flow diagrams) 4. development 5. testing and installation 6. maintenance and evaluation |
|
|
Term
|
Definition
an ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype |
|
|
Term
|
Definition
an ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype |
|
|
Term
3 elements of a problem statement |
|
Definition
1. data (input) 2. information (output) 3. method (process) |
|
|
Term
3 elements of a problem statement |
|
Definition
1. data (input) 2. information (output) 3. method (process) |
|
|
Term
|
Definition
a text-based approach to documenting an algorithm |
|
|
Term
standard symbols used in flowcharts |
|
Definition
diamond: binary decision
rectangle: process
parallelogram: input/output
oval: terminate
directed line: direction of flow |
|
|
Term
|
Definition
general term used for keywords in a programming language that allow the programmer to direct the flow of the program based on a decision |
|
|
Term
|
Definition
systematic approach in which a problem is broken down into a series of high-level tasks |
|
|
Term
|
Definition
programmers first identify all the categories (classes) of inputs that are part of the problem the program is meant to solve |
|
|
Term
|
Definition
an agreed-on set of rules defining how a language must be structured |
|
|
Term
|
Definition
a set of words with predefined meanings for a particular language |
|
|
Term
|
Definition
translating an algorithm into a programming language |
|
|
Term
1st generation language 1GL |
|
Definition
machine language of the CPU, sqn of bits |
|
|
Term
2nd generation language 2GL |
|
Definition
assembly language, programmers write their programs using a set of short, english-like commands that speak directly to the CPU |
|
|
Term
3rd generation language 3GL |
|
Definition
uses symbols and commands that help programmers tell the computer what to do
BASIC, FORTRAN, COBOL, C/C++, Java |
|
|
Term
4th generation language 4GL |
|
Definition
database query languages and report generators |
|
|
Term
structured query language |
|
Definition
example of 4GL
database programming language |
|
|
Term
|
Definition
most natural programming language
problem is presented as a series of facts or constraints instead of as a specific algorithm
PROLOG |
|
|
Term
|
Definition
tells the OS that the program needs to allocate storage space in RAM |
|
|
Term
|
Definition
program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language
takes longer than interpretation process but runs faster. |
|
|
Term
|
Definition
comprises the instructions programmers have written in the higher-level language |
|
|
Term
|
Definition
the binary sqn that instructs the CPUU to run their code, pure binary code |
|
|
Term
|
Definition
translates the source code into an intermediate form, line by line. each line is executed as it's translated |
|
|
Term
integrated development environment IDE |
|
Definition
a development tool that helps programmers write and test their programs |
|
|
Term
|
Definition
problems in logic not syntax, only caught when the program executes |
|
|
Term
|
Definition
programmer accidentally writes code that divides by zero |
|
|
Term
|
Definition
software modules which can be downloaded to repair errors identifies in the program code |
|
|
Term
|
Definition
simple, quick interface; easy to learn
often used to code prototype in Windows |
|
|
Term
rapid application development RAD |
|
Definition
alternative to the waterfall approach, creates a prototype first then generate system documents and remodel the system |
|
|
Term
|
Definition
developed for system programmers
accessing OS easier
uses higher level language but still allows programmer to manipulate memory and CPU registers directly |
|
|
Term
|
Definition
takes C to an object oriented level |
|
|
Term
|
Definition
object-oriented model
good choice for networked computers
architecture neutral (only needs to be compiled once to be used on many CPUs) |
|
|
Term
|
Definition
most common for OS X apps
superset of C object oriented |
|
|
Term
|
Definition
hypertext markup language
series of text that modify the display of text |
|
|
Term
|
Definition
simple programming language that's limited to performing a set of specialized tasks
JavaScript, VBScript, PHP |
|
|
Term
|
Definition
Asynchronous JavaScript and XML
program a web app that smoothly updates and communicates with other computers |
|
|
Term
|
Definition
JavaScript Object Notation
another standard for exchanging information between a server computer process and a client |
|
|
Term
|
Definition
enables users to define their own tags
facilitates exchange of information from web services |
|
|
Term
|
Definition
similar in syntax to visual basic
classes to rep web page components creates code that lives on the client machine and adds interaction to web pages |
|
|
Term
|
Definition
game development environment |
|
|
Term
|
Definition
when different versions of the same data appear in different places in a database |
|
|
Term
4 main operations of a database management system |
|
Definition
1. creating databases and entering data 2. viewing/browsing and sorting data 3. querying/extracting data 4. outputting data |
|
|
Term
|
Definition
each category of information is stored in a field |
|
|
Term
|
Definition
a group of related fields |
|
|
Term
|
Definition
|
|
Term
|
Definition
operates by organizing data into various tables based on logical groupings |
|
|
Term
|
Definition
stores data in objects rather than in tables |
|
|
Term
|
Definition
database validation rule
ensures that the data entered into the field falls within a certain range of values |
|
|
Term
|
Definition
database validation rule
ensures that all required fields have been completed |
|
|
Term
|
Definition
database validation rule
compares the values of data in two or more fields to see if those values are reasonable |
|
|
Term
alphabet and numeric checks |
|
Definition
database validation rules
alphabet check ensures that only textual characters are entered in a field
numeric check confirms that only numbers are entered in a field |
|
|
Term
|
Definition
1. extraction of data from source databases
2. transformation (reformatting) of the data
3. storage of the data in the data warehouse |
|
|
Term
online analytical processing software OLAP |
|
Definition
standardized tools for viewing and manipulating data in a date warehouse |
|
|
Term
|
Definition
the process by which great amounts of data are analyzed and investigated
spot specific patterns or trends |
|
|
Term
|
Definition
classification estimation affinity grouping clustering description/visualization |
|
|
Term
|
Definition
more users can be added easily without affecting the performance of other network nodes |
|
|
Term
electronic data interchange |
|
Definition
allows the exchange of large amounts of business data in a standardized electronic format
extranets are useful for enabling |
|
|
Term
virtual private network VPN |
|
Definition
uses the public Internet communications infrastructure to build a secure, private network among various locations
achieved by tunneling |
|
|
Term
|
Definition
data packets are placed inside other data packers, format of these external data packets is encrypted and can be understood only by the sending and receiving hardware (tunnel interface) |
|
|
Term
|
Definition
a server used to fulfill one specific function, such as handling email |
|
|
Term
|
Definition
keeps track o who is logging on to the network and which services on the network are available to each user |
|
|
Term
|
Definition
handles all communications between the network and other networks, including managing internet connectivity |
|
|
Term
|
Definition
using specialized software to make individual physical servers behave as though they are more than one physical device |
|
|
Term
|
Definition
the physical or logical arrangement of computers, transmission media, and other network components |
|
|
Term
|
Definition
a set of rules for exchanging communications |
|
|
Term
bus (linear bus) topology |
|
Definition
all computers are connected in a sequence on a single cable
passive |
|
|
Term
|
Definition
happen when two computers send data at the same time and the sets of data collide somewhere in the connection media
data is often lost or damaged
limitation of bus networks |
|
|
Term
|
Definition
a device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it |
|
|
Term
|
Definition
computer and peripherals laid out in configuration resembling a circle
data passed in token
active topology |
|
|
Term
|
Definition
access method employed by ring topology to avoid data collisions |
|
|
Term
|
Definition
most widely deployed
nodes connect to a central communicationdevice called a switch |
|
|
Term
|
Definition
carrier sense multiple access with collision detection
employed in star topology to avoid data collisions
if signals collide everything stops sending signals then the computers re-send after a random amount of time |
|
|
Term
media access control address |
|
Definition
6 two position characters, network adapter address |
|
|
Term
open systems interconnection |
|
Definition
application layer presentation layer session layer transport layer network layer data link layer physical layer |
|
|
Term
|
Definition
attempting to access an account by repeatedly trying different passwords |
|
|
Term
|
Definition
heavily secured server located on a special perimeter network between the company's secure internal network and the firewall
honey pot
often configured as proxy server |
|
|
Term
|
Definition
a collection of large national and international networks, have the fastest high speed connections |
|
|
Term
|
Definition
carried digital data over twisted-pair wires, initially connected backbone ISP |
|
|
Term
optical carrier (OC) lines |
|
Definition
backbone is typically a high-speed fiber-optic line, designated as an OC line |
|
|
Term
|
Definition
internet exchange point
connects ISPs |
|
|
Term
|
Definition
point of presence
bank of modems, servers, routers, and switches
individual internet users enter an ISP through a POP |
|
|
Term
|
Definition
computers that run specialized operating instructions, host web pages and other info to provide requested info to clients |
|
|
Term
|
Definition
enable users to buy goods and services over the web |
|
|
Term
|
Definition
computers deployed to provide remote storage space or act as storehouses for files that users can download |
|
|
Term
|
Definition
transmission control protocol/internet protocol
comprises many interrelated protocols
IP: send info 1 computer to another TCP: prepares data for transmission UDP: user datagram; prepares data, connectionless FTP: file transfer; download/uploads Telnet: log in remote computer HTTP(S): transfers HTML from servers to browsers SMTP: simpe mail transfer; emails DHCP: dynamic host configuration; take pool of IP addresses and share them with hosts on network |
|
|
Term
|
Definition
section of your hard drive that stores information that you may need again, such as IP addresses and frequently accessed web pages |
|
|
Term
classless interdomain routing CIDR |
|
Definition
gives IPv4 a prefix to increase number of possible IP addresses |
|
|
Term
|
Definition
the IP address for a computer never changes and is most likely assigned manually by a network admin or ISP |
|
|
Term
|
Definition
your computer is assigned a temporary address from an available pool of IP addresses
more common |
|
|
Term
|
Definition
used by JavaScript to organize the objects and page elements |
|
|