click below
click below
Normal Size Small Size show me how
Telecommunications
Computer skills terms that deal with Telecommunications
Question | Answer |
---|---|
What is needed in order to connect to the Internet? | IP Address |
A set of rules specifically for an organization's network such as a school's rules for Internet use. | AUP - Acceptable Use Policy |
A method of sending information over a network, simultaneously sending the same message to multiple recipients such as playing music over the Internet. | Broadcast |
Software programs like Internet Explorer and Safari that help you see web sites. | Browser |
An extension used in a URL, such as .com or .org; used to identify the type of entity to which a site belongs. | Domain Name |
Saving pictures, music or other files from a network or the Internet to your computer. | Download |
Examples of sources of viruses | Downloading, portable storage devices, email attachments |
A procedure that render the contents of a message or file unintelligible to anyone not authorized to read it such as scrambled credit card numbers when purchasing online. | Encryption |
A computer or computer software that stops unauthorized users from accessing private information; prevents network intrusion. | Firewall |
A satellite navigational system of satellites and receiving devices used to compute positions on earth. | GPS - Global positioning system |
A web browser feature that allows you to move quickly from one location to another. | Hyperlink |
The first or welcome page for a web site; the starting point for the entire site which may contain links from this starting page. | Home Page |
A global network of thousands of computer networks that offers e-mail and information services to millions of users. | Internet |
An internal Internet belonging to an organization such as a school. | Intranet |
A connection between one page in a hypertext or multimedia document and another page or document. | Link |
Two or more computers connected to each other in a local area; within the same building or room. | Local area network (LAN) |
What safety precaution should you always do before leaving a computer? | Log off or log out |
A device that permits a computer to transmit and receive data over a telephone line; it can be inside the computer (internal) or outside the computer (eternal). | Modem |
Software that is free for anyone to use. | Public domain software |
Happening at that moment; live | Real time |
Four examples of real time events | Teleconference, webcast, instant messaging, chat rooms |
Forwarding email to hundreds of people, usually junk mail is called what? | Spam |
Software that allows the user to block junk mail. | Spam blocker |
Two or more people who are geographically distant having a meeting across a telecommunications link. | Teleconference |
Occurs on the Internet where users post a questions or comment to an online discussion board and other users respond or comment. | Threaded discussion |
A program that destroys computer files or systems. | Virus |
Delivery of live or delayed sound or video broadcasts using web technology. | Webcast |
Two or more computers connected to each other over a long distance, usually between buildings. | WAN - Wide area network |
What should you do with email from people or companies that you do not know? | Delete it |
Secure passwords should include a series of what two things? | Numbers and letters |
The format most used for storing and transmitting photographs on the world wide web. | jpeg |
The standard for compression and storage of motion video. | mpeg |
An electronic document that carries its fonts, styles, and formatting which does not allow the document to be edited. | |
The person who controls the access to the Internet. | System administrator |
Ten computers that are networked need a minimum of how many printers in order for all ten to be able to print? | One |
The sharing of computer data or space on a network which allows multiple users to use the same file | File sharing |
Software that can be downloaded and tried out but if you keep it you must send the creator a fee. Not Free software. | Shareware |
A company that provides access to the Internet to individuals or companies | Internet Service Provider (ISP) |
A program that seems friendly but is really very destructive; when opened, it will send a virus onto your computer. | Trojan Horse |
A program that gets into your computer and copies itself over and over; keeps getting bigger and bigger until it shuts down the computer. | Worm |
When sending an email if you want to send a copy of the email to another person, where would you put the email address? | In the CC box |
In a URL, what are used to identify the type or king of site you are visiting? | Domain suffixes or file extension |
How would you send someone else a copy of an email that you have received? | Forward the email to that person. |
Dialog over time where a person post a comment and others respond to it. | Threaded discussion |
If you have an application for working at a fast food chain, what equipment would you need to send an electronic copy of that application to a friend? | Scanner |
What prevents your credit card information from being stolen when making purchases online? | Firewall |
What technology is capable of gathering personal information without your knowledge? | Spyware |
The denial, refusal, or rejection of a right, power, or responsibility such as a sign that says "Swim at your own risk" or on a web page in regard to external links. | Disclaimer |
Interactive communication using video and sound transmitted over telephone lines in real time. | Video conference |
Electronic journal to share opinions and ideas. | Blog |