Term
|
Definition
| marketers checking in with the voice of the crowd |
|
|
Term
| QR (quick response) codes |
|
Definition
| those funny black and white square pixels things |
|
|
Term
|
Definition
| the process of searching huge amounts of data with the hope of finding a pattern |
|
|
Term
|
Definition
| developing systems that can recognize and simulate human emotions |
|
|
Term
| 4 major functions of a computer |
|
Definition
input process output storage |
|
|
Term
|
Definition
8 binary digits (bits) combine to create a byte
each letter, number, and special character is represented by a byte (or eight bits -> 0s & 1s) |
|
|
Term
|
Definition
| width-to-height proportion of a monitor |
|
|
Term
|
Definition
inkjet, laser
sprays ink or uses laser beams to transfer marks onto the paper |
|
|
Term
|
Definition
| has tiny hammer-like keys that strike the papaer through an inked ribbon to make marks on the paper. legacy tech* |
|
|
Term
|
Definition
| main circuit board that contains the cnetral electronic components, including its CPU, memory, and many circuit boards |
|
|
Term
|
Definition
random access memory
volatile storage
programs ad data the computer is currently using is stored |
|
|
Term
|
Definition
read-only memory
nonvolatile storage location
stores all the instructions the computer needs to start |
|
|
Term
|
Definition
central processing unit "processor"
controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions |
|
|
Term
|
Definition
| allows you to connect up to six different peripherals to your computer |
|
|
Term
|
Definition
| transmission lines with the fastest speeds |
|
|
Term
business to consumer e-commerce B2C |
|
Definition
| transactions take place btw business and consumer |
|
|
Term
business-to-business e-commerce B2B |
|
Definition
| transactions occur when businesses buy and sell goods and services to other businesses |
|
|
Term
consumer-to-consumer e-commerce C2C |
|
Definition
| transaction occur when consumers sell to each other through sites like ebay |
|
|
Term
|
Definition
| evolving extension of the web in which data is defined in such a way to make it more easily processed by computers. |
|
|
Term
|
Definition
the suffix in the domain name .edu .ca |
|
|
Term
| timeline of personal computer |
|
Definition
1975: altair 1976: Apple I 1977: Apple II 1977: Commodore Pet 1977: TRS-80 1981: Osbourne 1981: IBM PC |
|
|
Term
| timeline of personal computer |
|
Definition
1975: altair 1976: Apple I 1977: Apple II 1977: Commodore Pet 1977: TRS-80 1981: Osbourne 1981: IBM PC |
|
|
Term
|
Definition
Beginners All-Purpose Symbolic Instruction Code
easy to learn computer language |
|
|
Term
|
Definition
disc operating system
OS that controlled the first Apple computers |
|
|
Term
|
Definition
| operating systems used in early IBM PCs |
|
|
Term
|
Definition
first electronic spreadsheet program 1978 |
|
|
Term
|
Definition
first word processing application 1978 |
|
|
Term
|
Definition
Best DOS-based word processor, eventually sold to Novell and later acquired by Corel 1980 |
|
|
Term
|
Definition
added integrated charting, plotting, and database capabilities to spreadsheet software 1983 |
|
|
Term
|
Definition
introduced in the pages of PC World magazine on the first magazine-inserted demo disk 1983 |
|
|
Term
|
Definition
one of the first spreadsheets to use a graphical user interface 1985 |
|
|
Term
|
Definition
the first desktop publishing software 1985 |
|
|
Term
graphical user interface GUI |
|
Definition
allowed users to interact with computer more easily
developed by photocopier manufacturer Xerox for Alto PC |
|
|
Term
|
Definition
1983, Apple, first PC with GUI
features: windows, drop-down menu, icons, file system, mouse
price too high |
|
|
Term
|
Definition
| 1984, apple PC, Lisa ++ at half the price |
|
|
Term
|
Definition
|
|
Term
|
Definition
| 1995, IBM web browser integrated with Microsoft Office software |
|
|
Term
|
Definition
| first microsoft OS designed to be principally a GUI OS |
|
|
Term
|
Definition
| 1994, web browser, predominant player in web browser software |
|
|
Term
|
Definition
first accurate mechanical calculator 1642 |
|
|
Term
|
Definition
machine that automated the weaving of complex patterns
stiff cards with punched holes to automate the process, punch cards used in early computers |
|
|
Term
|
Definition
based on difference machine
Babbage - father of computing
first automatic calculator
never actually developed, but components from the detailed plans were used in computers. |
|
|
Term
|
Definition
| huge steam powered mechanical calculator designed to print astronomical tables |
|
|
Term
| Hollerith tabulating machine |
|
Definition
first punch-card machine
company was the precursor to IBM |
|
|
Term
|
Definition
1936, mechanical calculator
first computer to include certain important components |
|
|
Term
Antanasoff-Berry Computer ABC |
|
Definition
first electrically powered digital computer 1939
vacuum tubes instead of switches to store data
first computer to use the binary system |
|
|
Term
|
Definition
Mark series of computers designed for the U.S. Navy for ballistics and gunnery calculations.
add, subtract, multiply, divide |
|
|
Term
|
Definition
| a program that translates English-language instructions into computer instructions |
|
|
Term
|
Definition
1936 abstract computer model that could perform logical operations
not a real machine but a hypothetical model that mathematically defined a mechanical procedure (or algorithm)
infinite paper tape the precursor to RAM |
|
|
Term
|
Definition
electronic numerical integrator and computer
US gov sponsored machine designed to calculate the settings used for weapons 1944-1955 |
|
|
Term
|
Definition
universial automatic computer
first commercially successful electronic digital computer
magnetic tape instead of punch cards |
|
|
Term
| second generation computers |
|
Definition
| comuters that use transistors |
|
|
Term
| third generation computers |
|
Definition
computers with early integrated circuit (small chip capable of containing thousands of transistors) |
|
|
Term
|
Definition
computers that use a microprocessor (CPU, 1971, Intel, small chip containing millions of transistors)
Intel Core i7 (billions of transistors) |
|
|
Term
Software as a Service SaaS |
|
Definition
| the vendor hosts the software online and you access and use the software over the Internet without having it installed on your computer |
|
|
Term
|
Definition
| small program that groups a series of commands so that they will run as a single command |
|
|
Term
computer aided design CAD programs |
|
Definition
| 3-D models, technical drawings, automated designs |
|
|
Term
|
Definition
| small program that performs many of the general housekeeping tasks |
|
|
Term
|
Definition
embedded systems
program with a specific purpose, usually for machinery that performs a repetitive series of tasks in an exact amount of time |
|
|
Term
|
Definition
| lets more than one user access the computer system at a time by handling and prioritizing requests from multiple users |
|
|
Term
|
Definition
| multiuser, multitaksing OS that is used as a network OS |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a special numerical code that prioritizes the request |
|
|
Term
|
Definition
| the process of optimizing RAM storage by borrowing hard drive space |
|
|
Term
|
Definition
condition of excessive paging/swapping with virtual memory
fix problem by adding RAM |
|
|
Term
|
Definition
| a software and hardware standard designed to facilitate the installation of new hardware in Pcs by including in the OS the drivers these devices need in order to run |
|
|
Term
application programming interface API |
|
Definition
| the blocks of code that application software needs in order to interact with the CPU |
|
|
Term
|
Definition
no universal moral truth
moral principles dictated by cultural tastes and customs |
|
|
Term
|
Definition
| God is all-knowing and sets moral standards |
|
|
Term
|
Definition
actions are judged solely by consequences
greater good |
|
|
Term
|
Definition
|
|
Term
|
Definition
duty-based
morals should apply to everyone equally |
|
|
Term
|
Definition
describes the pace at which CPUs improve
CPU capacity will double every 2 years |
|
|
Term
|
Definition
1. fetches 2. decodes 3. executes 4. stores |
|
|
Term
|
Definition
| provides quicker processing of information by enabling a new set of instructions to start executing before the previous has been finished |
|
|
Term
|
Definition
Windows memory management
monitors the applications you use the most and preloads them into your system memory so they'll be ready to be used |
|
|
Term
|
Definition
redundant array of independent disks
a set of strategies for using more than one drive in a system
RAID 0: stores half on each disk RAID 1: stores on both disks |
|
|
Term
|
Definition
| electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers |
|
|
Term
|
Definition
| 2+ computers that are connected via software and hardware so they can communicate |
|
|
Term
|
Definition
| each device connected to a network |
|
|
Term
|
Definition
| electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers |
|
|
Term
|
Definition
| 2+ computers that are connected via software and hardware so they can communicate |
|
|
Term
|
Definition
| each device connected to a network |
|
|
Term
|
Definition
bandwidth
the maximum speed at which data can be transmitted between two nodes |
|
|
Term
|
Definition
| the actual speed of transfer that is achieved between two nodes on a network |
|
|
Term
|
Definition
| used for communication among devices close to one person |
|
|
Term
|
Definition
| nodes are all located within a small geographical area |
|
|
Term
| metropolitan area network |
|
Definition
| large network desgined to provide access to a specific geographic area, such as a city |
|
|
Term
|
Definition
spans a large physical distance
e.g. the internet |
|
|
Term
|
Definition
central administration
client is a computer on which users accomplish tasks and make requests
servers is the computer that provides information or resources to the client computers as well as central admin for network functions such as printing |
|
|
Term
| peer-to-peer (P2P) network |
|
Definition
local administration
each node can communicate directly with every other node
most common home network |
|
|
Term
|
Definition
| made up of copper wires that are twisted around each other and surrounded by a plastic jacket |
|
|
Term
| unshielded twisted-pair cable |
|
Definition
used for networks
four pairs of wires twisted around each other |
|
|
Term
|
Definition
| single copper wire surrounded by layers of plastic |
|
|
Term
|
Definition
| plastic or glass fibers that transmit data at extremely fast speeds |
|
|
Term
|
Definition
| network adapter integrated into many devices |
|
|
Term
|
Definition
| transmits internet over coaxial cables that also transmit cable television signals |
|
|
Term
| digital subscriber line DSL |
|
Definition
| twisted-pair cable, same as for telephones |
|
|
Term
| network attached storage (NAS) device |
|
Definition
| specialized devices designed to store and manage all network data |
|
|
Term
|
Definition
| uses small radio transmitters instead of wireless routers as its network nodes |
|
|
Term
| network attached storage (NAS) device |
|
Definition
| specialized devices designed to store and manage all network data |
|
|
Term
|
Definition
| uses small radio transmitters instead of wireless routers as its network nodes |
|
|
Term
|
Definition
service set identifier
name of the network |
|
|
Term
|
Definition
base-16 number system
more convenient for programmers compared to binary (base 2) and base 10. |
|
|
Term
|
Definition
American Standard for Information Interchange
represents each letter or character as an 8-bit (1 byte) binary code |
|
|
Term
|
Definition
| new encoding scheme that uses 18 bits. First 128 characters of Unicode are identical to ASCII |
|
|
Term
|
Definition
| a technique that allows the CPU to work on more than one instruction at the same time |
|
|
Term
|
Definition
| a large network of computers, with each computer working on a portion of the same problem simultaneously |
|
|
Term
| analog-to-digital converter chips |
|
Definition
| converts your voice's sound waves into digital signals |
|
|
Term
|
Definition
| specialized chip in a smart phone that compresses digital data |
|
|
Term
|
Definition
compression/decompression
a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space |
|
|
Term
|
Definition
replicates itself onto a hard rive's master boot record, virus loaded into memory upon boot
often transmitted by flash drive left in an USB port |
|
|
Term
|
Definition
| virus triggered when certain logical conditions are met such as opening a file or starting a program a number of times |
|
|
Term
|
Definition
| a virus that is triggered by the passage of time or on a certain date |
|
|
Term
|
Definition
often called a virus, but different
works independently of host file execution, more active in spreading itself |
|
|
Term
|
Definition
series of commands-actually a miniprogram-that is executed without your knowledge
some scripts are legitimate, some malicious |
|
|
Term
|
Definition
| virus that attaches itself to a document that uses macro (short series of commands that usually automates repetitive tasks) |
|
|
Term
|
Definition
run a program that searches for common types of data files, such as word, and compresses them using a complex encryption key that renders them unusable. Then they charge you for a program to decrypt them.
can trace payments |
|
|
Term
|
Definition
| changes its own code or periodically rewrites itself to avoid detection |
|
|
Term
|
Definition
| infect multiple files types in an effort to fool the antivirus software that is looking for it |
|
|
Term
|
Definition
| a portion of the virus code that;s unique to a particular virus |
|
|
Term
|
Definition
malicious websites set-up to attack your computer by downloading harmful software onto your computer
keeping your OS up to date helps prevent |
|
|
Term
| white-hat/ethical hackers |
|
Definition
| break into systems for non-malicious reasons such as to test security |
|
|
Term
|
Definition
| break into systems to destroy information or for illegal gain |
|
|
Term
|
Definition
| illegally break into systems to flaunt their expertise or in attempt to sell their services in security breaches |
|
|
Term
|
Definition
sniffer
a program developed by hackers that looks at each packet as it travels over the internet |
|
|
Term
|
Definition
| a program that appears to be something useful or desirable, but while it runs, it does something malicious in the background |
|
|
Term
|
Definition
programs, or sets of programs, designed to allow hackers to gain access to your computer and take control of it without your knowledge
most common thing that happens in the background of a trojan |
|
|
Term
| denial of service (DoS) attacks |
|
Definition
| legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer system he has taken over by a zombie |
|
|
Term
|
Definition
large group of software programs that runs autonomously on zombie computers.
often used to coordinate distributed denial-of-service attacks |
|
|
Term
|
Definition
| virtual communication gateways or paths that allow a computer to organize requests for information |
|
|
Term
|
Definition
| a piece of data attached to a photo that indicates your latitude and longitude when you took the photo |
|
|
Term
|
Definition
a software program or hardware device designed to protect computers from hackers
1. block access to logical ports 2. keeping your computer's network address secure |
|
|
Term
|
Definition
| firewalls an be configured to filter out packets sent to specific logical ports |
|
|
Term
|
Definition
| firewalls are configured to ignore requests that originate from the internet asking for access to certain ports |
|
|
Term
| network address translation |
|
Definition
| firewalls use this process to assign internal IP addresses to a network, hackers should not be able to access it. |
|
|
Term
|
Definition
small tect files that some websites automatically store on your hard drive when you visit them
pose no security threat |
|
|
Term
|
Definition
| using a work computer for non-work activities while you're being paid to do your job |
|
|
Term
|
Definition
| any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information |
|
|
Term
|
Definition
social engineering
creates a scenario that sounds legitimate enough that someone will trust you
phishing most common form |
|
|
Term
|
Definition
| lures internet users to reveal personal info such as credit card #s, SIN, etc... |
|
|
Term
|
Definition
more insidious than phishing
malicious code is planted on your computer, either by viruses or visiting malicious websites, which then alters your browser's ability to find web addresses
end up at a fake website that look legitimate but is designed to steal info |
|
|
Term
|
Definition
| type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus. you're then directed to a website to buy bogus antivirus software to remove it |
|
|
Term
system development life cycle SDLC |
|
Definition
1. problem and opportunity identification 2. analysis (program specification) 3. design (data-flow diagrams) 4. development 5. testing and installation 6. maintenance and evaluation |
|
|
Term
system development life cycle SDLC |
|
Definition
1. problem and opportunity identification 2. analysis (program specification) 3. design (data-flow diagrams) 4. development 5. testing and installation 6. maintenance and evaluation |
|
|
Term
|
Definition
| an ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype |
|
|
Term
|
Definition
| an ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype |
|
|
Term
| 3 elements of a problem statement |
|
Definition
1. data (input) 2. information (output) 3. method (process) |
|
|
Term
| 3 elements of a problem statement |
|
Definition
1. data (input) 2. information (output) 3. method (process) |
|
|
Term
|
Definition
| a text-based approach to documenting an algorithm |
|
|
Term
| standard symbols used in flowcharts |
|
Definition
diamond: binary decision
rectangle: process
parallelogram: input/output
oval: terminate
directed line: direction of flow |
|
|
Term
|
Definition
| general term used for keywords in a programming language that allow the programmer to direct the flow of the program based on a decision |
|
|
Term
|
Definition
| systematic approach in which a problem is broken down into a series of high-level tasks |
|
|
Term
|
Definition
| programmers first identify all the categories (classes) of inputs that are part of the problem the program is meant to solve |
|
|
Term
|
Definition
| an agreed-on set of rules defining how a language must be structured |
|
|
Term
|
Definition
| a set of words with predefined meanings for a particular language |
|
|
Term
|
Definition
| translating an algorithm into a programming language |
|
|
Term
1st generation language 1GL |
|
Definition
| machine language of the CPU, sqn of bits |
|
|
Term
2nd generation language 2GL |
|
Definition
| assembly language, programmers write their programs using a set of short, english-like commands that speak directly to the CPU |
|
|
Term
3rd generation language 3GL |
|
Definition
uses symbols and commands that help programmers tell the computer what to do
BASIC, FORTRAN, COBOL, C/C++, Java |
|
|
Term
4th generation language 4GL |
|
Definition
| database query languages and report generators |
|
|
Term
| structured query language |
|
Definition
example of 4GL
database programming language |
|
|
Term
|
Definition
most natural programming language
problem is presented as a series of facts or constraints instead of as a specific algorithm
PROLOG |
|
|
Term
|
Definition
| tells the OS that the program needs to allocate storage space in RAM |
|
|
Term
|
Definition
program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language
takes longer than interpretation process but runs faster. |
|
|
Term
|
Definition
| comprises the instructions programmers have written in the higher-level language |
|
|
Term
|
Definition
| the binary sqn that instructs the CPUU to run their code, pure binary code |
|
|
Term
|
Definition
| translates the source code into an intermediate form, line by line. each line is executed as it's translated |
|
|
Term
integrated development environment IDE |
|
Definition
| a development tool that helps programmers write and test their programs |
|
|
Term
|
Definition
| problems in logic not syntax, only caught when the program executes |
|
|
Term
|
Definition
| programmer accidentally writes code that divides by zero |
|
|
Term
|
Definition
| software modules which can be downloaded to repair errors identifies in the program code |
|
|
Term
|
Definition
simple, quick interface; easy to learn
often used to code prototype in Windows |
|
|
Term
rapid application development RAD |
|
Definition
| alternative to the waterfall approach, creates a prototype first then generate system documents and remodel the system |
|
|
Term
|
Definition
developed for system programmers
accessing OS easier
uses higher level language but still allows programmer to manipulate memory and CPU registers directly |
|
|
Term
|
Definition
| takes C to an object oriented level |
|
|
Term
|
Definition
object-oriented model
good choice for networked computers
architecture neutral (only needs to be compiled once to be used on many CPUs) |
|
|
Term
|
Definition
most common for OS X apps
superset of C object oriented |
|
|
Term
|
Definition
hypertext markup language
series of text that modify the display of text |
|
|
Term
|
Definition
simple programming language that's limited to performing a set of specialized tasks
JavaScript, VBScript, PHP |
|
|
Term
|
Definition
Asynchronous JavaScript and XML
program a web app that smoothly updates and communicates with other computers |
|
|
Term
|
Definition
JavaScript Object Notation
another standard for exchanging information between a server computer process and a client |
|
|
Term
|
Definition
enables users to define their own tags
facilitates exchange of information from web services |
|
|
Term
|
Definition
similar in syntax to visual basic
classes to rep web page components creates code that lives on the client machine and adds interaction to web pages |
|
|
Term
|
Definition
| game development environment |
|
|
Term
|
Definition
| when different versions of the same data appear in different places in a database |
|
|
Term
| 4 main operations of a database management system |
|
Definition
1. creating databases and entering data 2. viewing/browsing and sorting data 3. querying/extracting data 4. outputting data |
|
|
Term
|
Definition
| each category of information is stored in a field |
|
|
Term
|
Definition
| a group of related fields |
|
|
Term
|
Definition
|
|
Term
|
Definition
| operates by organizing data into various tables based on logical groupings |
|
|
Term
|
Definition
| stores data in objects rather than in tables |
|
|
Term
|
Definition
database validation rule
ensures that the data entered into the field falls within a certain range of values |
|
|
Term
|
Definition
database validation rule
ensures that all required fields have been completed |
|
|
Term
|
Definition
database validation rule
compares the values of data in two or more fields to see if those values are reasonable |
|
|
Term
| alphabet and numeric checks |
|
Definition
database validation rules
alphabet check ensures that only textual characters are entered in a field
numeric check confirms that only numbers are entered in a field |
|
|
Term
|
Definition
1. extraction of data from source databases
2. transformation (reformatting) of the data
3. storage of the data in the data warehouse |
|
|
Term
online analytical processing software OLAP |
|
Definition
| standardized tools for viewing and manipulating data in a date warehouse |
|
|
Term
|
Definition
the process by which great amounts of data are analyzed and investigated
spot specific patterns or trends |
|
|
Term
|
Definition
classification estimation affinity grouping clustering description/visualization |
|
|
Term
|
Definition
| more users can be added easily without affecting the performance of other network nodes |
|
|
Term
| electronic data interchange |
|
Definition
allows the exchange of large amounts of business data in a standardized electronic format
extranets are useful for enabling |
|
|
Term
virtual private network VPN |
|
Definition
uses the public Internet communications infrastructure to build a secure, private network among various locations
achieved by tunneling |
|
|
Term
|
Definition
| data packets are placed inside other data packers, format of these external data packets is encrypted and can be understood only by the sending and receiving hardware (tunnel interface) |
|
|
Term
|
Definition
| a server used to fulfill one specific function, such as handling email |
|
|
Term
|
Definition
| keeps track o who is logging on to the network and which services on the network are available to each user |
|
|
Term
|
Definition
| handles all communications between the network and other networks, including managing internet connectivity |
|
|
Term
|
Definition
| using specialized software to make individual physical servers behave as though they are more than one physical device |
|
|
Term
|
Definition
| the physical or logical arrangement of computers, transmission media, and other network components |
|
|
Term
|
Definition
| a set of rules for exchanging communications |
|
|
Term
| bus (linear bus) topology |
|
Definition
all computers are connected in a sequence on a single cable
passive |
|
|
Term
|
Definition
happen when two computers send data at the same time and the sets of data collide somewhere in the connection media
data is often lost or damaged
limitation of bus networks |
|
|
Term
|
Definition
| a device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it |
|
|
Term
|
Definition
computer and peripherals laid out in configuration resembling a circle
data passed in token
active topology |
|
|
Term
|
Definition
| access method employed by ring topology to avoid data collisions |
|
|
Term
|
Definition
most widely deployed
nodes connect to a central communicationdevice called a switch |
|
|
Term
|
Definition
carrier sense multiple access with collision detection
employed in star topology to avoid data collisions
if signals collide everything stops sending signals then the computers re-send after a random amount of time |
|
|
Term
| media access control address |
|
Definition
| 6 two position characters, network adapter address |
|
|
Term
| open systems interconnection |
|
Definition
application layer presentation layer session layer transport layer network layer data link layer physical layer |
|
|
Term
|
Definition
| attempting to access an account by repeatedly trying different passwords |
|
|
Term
|
Definition
heavily secured server located on a special perimeter network between the company's secure internal network and the firewall
honey pot
often configured as proxy server |
|
|
Term
|
Definition
| a collection of large national and international networks, have the fastest high speed connections |
|
|
Term
|
Definition
| carried digital data over twisted-pair wires, initially connected backbone ISP |
|
|
Term
| optical carrier (OC) lines |
|
Definition
| backbone is typically a high-speed fiber-optic line, designated as an OC line |
|
|
Term
|
Definition
internet exchange point
connects ISPs |
|
|
Term
|
Definition
point of presence
bank of modems, servers, routers, and switches
individual internet users enter an ISP through a POP |
|
|
Term
|
Definition
| computers that run specialized operating instructions, host web pages and other info to provide requested info to clients |
|
|
Term
|
Definition
| enable users to buy goods and services over the web |
|
|
Term
|
Definition
| computers deployed to provide remote storage space or act as storehouses for files that users can download |
|
|
Term
|
Definition
transmission control protocol/internet protocol
comprises many interrelated protocols
IP: send info 1 computer to another TCP: prepares data for transmission UDP: user datagram; prepares data, connectionless FTP: file transfer; download/uploads Telnet: log in remote computer HTTP(S): transfers HTML from servers to browsers SMTP: simpe mail transfer; emails DHCP: dynamic host configuration; take pool of IP addresses and share them with hosts on network |
|
|
Term
|
Definition
| section of your hard drive that stores information that you may need again, such as IP addresses and frequently accessed web pages |
|
|
Term
classless interdomain routing CIDR |
|
Definition
| gives IPv4 a prefix to increase number of possible IP addresses |
|
|
Term
|
Definition
| the IP address for a computer never changes and is most likely assigned manually by a network admin or ISP |
|
|
Term
|
Definition
your computer is assigned a temporary address from an available pool of IP addresses
more common |
|
|
Term
|
Definition
| used by JavaScript to organize the objects and page elements |
|
|