click below
click below
Normal Size Small Size show me how
Arkansas CT Unit 3
Unti 3 Terms Arkansas Computer Technology Introduction
Question | Answer |
---|---|
a feature of some email applications that stores names and email addresses in an accessible format | Address Book |
type of software that can process information on its own without human intervention | Artificial Intelligence |
software program used to retrieve document from the World Wide Web (WWW or Web) and to display them in a readable format | Browser |
a storage location on a computer’s hard disk used to temporarily store Internet files | Cache |
a computer that uses the services of another program | Client |
criminal act committed through the use of a computer, such as getting into someone else’s system and changing information or creating a computer virus and causing damage to others’ information | Computer Crime |
manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss | Computer Fraud |
using the computer for learning and instruction | Computer-based Learning |
small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie files are stored on your computer | Cookies |
the exclusive right granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work | Copyright |
identifies a site on the Internet | Domain Name |
business conducted over the Internet; also called e – commerce | Electronic Commerce (e-commerce) |
transmission of electronic messages over networks | Electronic Mail (e-mail) |
a network configuration that allows selected outside organizations to access internal information systems | Extranet |
invading someone else’s computer, usually for personal gain or just for the satisfaction of invading someone else’s computer | Hacking |
any time a piece of data matches search words you specify | Hits |
first page that is displayed when a browser is launched | Home Page |
a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices | Hub |
protocol that controls how Web pages are formatted and displayed | Hypertext Markup Language (HTML) |
protocol that defines how messages are formatted and transmitted over the World Wide Web | Hypertext Transfer Protocol (HTTP) |
the crime of obtaining someone else’s personal data and using it for financial gain or to defraud or deceive | Identity Theft |
the largest network used as a communication tool | Internet |
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization | Intranet |
words that describe the information the user is trying to locate | Keywords |
ability to move through a Web page | Navigation |
often used to describe rules for proper online behavior | Netiquette |
discussion forum or a type of bulletin board | Newsgroup |
claiming someone else’s words as your own | Plagiarism |
information or content to which copyright protection does not apply and that is available for anyone to copy | Public Domain |
a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination | Router |
software program used to search the Internet through the use of keywords | Search Engine |
a computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients) | Server |
the illegal copying or use of computer programs | Software Piracy |
unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called “junk” e-mail | Spam |
program that searches the Web; called a spider because it crawls all over the Web | Spider |
address that tells the browser where to locate the page; it is typed into the address bar | Uniform Resource Locator (URL) |
an artificial environment used in education, medicine, training, research, and other fields | Virtual Reality |
input devices that are used to issue spoken or voice commands to the computer | Voice Recognition |
computer that houses and delivers Web pages | Web Server |
the asterisk ( * ) symbol; used to search for words that the user is not sure how to spell or for word variations | Wildcard Character |
computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks | Worm |