Term
|
Definition
| (Center for European Nuclear Research) where Tim Berners-Lee invented a standard programming language |
|
|
Term
|
Definition
|
|
Term
| Uniform Research Locators |
|
Definition
| URL) is the address of a website and have components that make it up |
|
|
Term
| Browser application software |
|
Definition
| what displays the website |
|
|
Term
|
Definition
| A good design of a website can be a customer's initial impression of a business |
|
|
Term
|
Definition
| also call "favorites"; will catalog your favorite URL's that the user has visited or plans to visit, so the user doesn't have to remember the page URL. |
|
|
Term
|
Definition
| are text files sent to a browser and then sent back unchanged by the browser to the originating server. Used for tracking and maintaining specific information. |
|
|
Term
|
Definition
| are client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page. |
|
|
Term
|
Definition
| settings to disallow popups |
|
|
Term
|
Definition
|
|
Term
|
Definition
| is high data-transmission rate Internet connection. |
|
|
Term
|
Definition
| a search engines organized into directories like medicine or automotive so the user can search only within a particular area. |
|
|
Term
|
Definition
| need a very capable management team, a well-organized business structure, good customer service, inventory controls, and much more. |
|
|
Term
|
Definition
| e-commerce websites need to provide an easy, secure way to handle transactions while remaining attractive and very easy to use and navigate. |
|
|
Term
|
Definition
| carbon copy; option in emailing that offers the ability to copy more than one recipient and lets all of the recipients know who else has received the same email. |
|
|
Term
|
Definition
| blind carbon copy; distribution option works like the carbon copy except none of the recipients know who else received the same email, or whether anyone other than them received it at all. |
|
|
Term
|
Definition
| Terms of Service Agreement; email server owners rules that specifically outlines e-mail usage and protocols. Don't say or type anything in an email that you wouldn't be willing to say in public. |
|
|
Term
|
Definition
| encompasses the general use of equipment to provide voice communication over distances, specifically by connecting telephones to each other |
|
|
Term
|
Definition
| invented a standard programming language called HTML and the protocol to move information through the Internet called HTTP. |
|
|
Term
|
Definition
| The ability to link various media and devices, thereby enhancing communication and improving access to information. |
|
|
Term
|
Definition
| is the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. |
|
|
Term
|
Definition
| is often someone who attempts to evade or disable a computer's security measures, and then steals computer resources at their leisure |
|
|
Term
|
Definition
| is extremely easy to breach, especially by a seasoned hacker. |
|
|
Term
|
Definition
| are the most uncomplicated type of Internet fraud. Involve a buyer typically in another country that approaches merchants via spam and asks if they can pay for shipping with a credit card. Once the order is shipped, the credit card is cancelled and the shipping company receives a charge back and loses all of their money from the other |
|
|
Term
|
Definition
| a copy of a webpage was sent from the book seller's server to your computer (client). The server also sent a small text file called a cookie that the user is typically unaware of. |
|
|
Term
|
Definition
| when experts extract useful data and information from recorded data like a cookie |
|
|
Term
|
Definition
| are a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the web. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| (Advanced Research Project Agency Network); one of the precursors to today's Internet. |
|
|
Term
|
Definition
| (Hypertext Markup Language); standard programming language |
|
|
Term
|
Definition
| is application software that provides an interface which lets a user display and interact with text, images, and other information located on the WWW. |
|
|
Term
|
Definition
| the protocol to move information through the Internet |
|
|
Term
|
Definition
| (World Wide Web); resides on the Internet |
|
|
Term
|
Definition
|
|
Term
|
Definition
| what the Internet network is called; a computer on a network that stores Web pages is called the server or host, and the computer on the network tat requests those Web pages is called a client. A computer can be both a client and a server at the same time. |
|
|
Term
|
Definition
| (Internet Protocol): an address system to identify and communicate throughout the network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| people that produce a website |
|
|
Term
|
Definition
| is when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the WWW or request it again from the originating server |
|
|
Term
| Graphic files (GIF and JPEG) |
|
Definition
| how web browsers display images; (Graphics Interchange Format) and (Joint Photographic Expert Group) |
|
|
Term
|
Definition
| are client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page. |
|
|
Term
|
Definition
| programs that enable users to access a certain type of data |
|
|
Term
|
Definition
| The ability to link various media and devices, thereby enhancing communication and improving access to information. |
|
|
Term
| ISP (Internet Service Provider) |
|
Definition
| is a business or organization that provides people a way to access the Internet and WWW. |
|
|
Term
|
Definition
| is a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria. Ex. Yahoo, Google, and AltaVista |
|
|
Term
|
Definition
| look and work like keyword searches, but return the results of many search engines at once and eliminate duplicates hits |
|
|
Term
| E-Commerce (Electronic Commerce) |
|
Definition
| is the distributing, buying, selling, advertising, and marketing of goods or services over the Web. |
|
|
Term
|
Definition
| is (definition of e-commerce) to other businesses; inclined to take place within specific categories |
|
|
Term
|
Definition
| is where commercial organizations sell to consumers. |
|
|
Term
|
Definition
| involves e-commerce between consumers, usually facilitated by some third party. |
|
|
Term
|
Definition
| research any business needs to ask for success |
|
|
Term
| Streamline Business Process |
|
Definition
| how you do business on the Web |
|
|
Term
|
Definition
| allows for website reengineering, and even an entire business facelift far faster than conventional businesses. |
|
|
Term
|
Definition
| when the browser's settings are modified by Malware |
|
|
Term
|
Definition
| is software designed to damage a computer's system without the owner's knowledge. |
|
|
Term
|
Definition
| is like a virus in that it spreads quickly and is extremely harmful, but does not need to attach itself to an existing program. They are self-replicating, they harm networks |
|
|
Term
|
Definition
| is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a users system. |
|
|
Term
|
Definition
| is software which routinely displays advertising to a computer system after the software is installed, usually without the user's consent. |
|
|
Term
|
Definition
| is a malicious computer program that can copy itself and infect a computer, typically without the user being aware of it. |
|
|
Term
|
Definition
| watch out for stuff like phishing |
|
|
Term
| VoIP (Voice over Internet Protocol) |
|
Definition
| is the routing of voice conversations, or typically, phone calls over the Internet. VolP phone system that uses the Internet as its phone lines instead of traditional phone lines. |
|
|
Term
| Most important part of a website |
|
Definition
|
|
Term
| Second most important part of a website |
|
Definition
|
|
Term
| Internet Explorer has poor security because... |
|
Definition
| it's integrated into your Microsoft OS. Firefox is better because it's a standalone program. |
|
|
Term
|
Definition
| is the most important on the internet |
|
|
Term
|
Definition
| Hardware used in intranet |
|
|
Term
|
Definition
| is concerned with risk management, confidentiality, integrity and the availability of the electronic information that is processed and stored on a computing system. |
|
|
Term
|
Definition
| is the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them. |
|
|
Term
| DoS attack: (Denial of Service attack) |
|
Definition
| most harmful; is an attempt to make a computer or any of its resources unavailable to its intended users |
|
|
Term
| Reverse Phishing/Keylogging |
|
Definition
| a relatively newer form of malware, key logging is when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard |
|
|
Term
|
Definition
| operating system protecting their user's operating systems by automatically offering online updates that have been identified as security threats in the operating system itself. |
|
|
Term
|
Definition
| is actually a very broad term that refers to any fraudulent activity regarding online activity. Typically, this type of fraud is through criminal solicitation followed by transferring the proceeds to the perpetrators. most common is stealing credit card data leads to identity theft |
|
|
Term
|
Definition
| a criminal in a public place will simply glance over their victims' shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number |
|
|
Term
| Facebook is worth billions because... |
|
Definition
| it has a large database online |
|
|