click below
click below
Normal Size Small Size show me how
CGS Exam 2
| Term | Definition |
|---|---|
| Application service provider (ASP) | A company that manages and distributes software-based services over the Internet. |
| ARPANET | The predecessor of the Internet, named after the Advanced Research Projects Agency (ARPA), which sponsored its development. |
| Blog | A Web page that contains short, frequently updated entries in chronological order, typically by just one individual. |
| Broadband over fiber (BoF) Internet access | Very fast, direct Internet access via fiber-optic networks; also referred to as fiber-to-the-premises (FTTP) Internet access. |
| Cable Internet access | Fast, direct Internet access via cable TV lines. |
| Conventional dial-up Internet access | Dial-up Internet access via standard telephone lines. |
| Cookie | A small file stored on a user's hard drive by a Web server; commonly used to identify personal preferences and settings for that user. |
| Dial-up connection | A type of Internet connection in which the computer or other device must dial up and connect to a service provider's computer via telephone lines before being connected to the Internet. |
| Direct connection | A type of Internet connection in which the computer or other device is connected to the Internet continually. |
| Directory search | A type of Internet search where categories are selected to locate information on the Internet. |
| Distance learning | A learning environment in which the student is physically located away from the instructor and other students; commonly, instruction and communications take place via the Web. |
| DSL (Digital Subscriber Line) Internet access | Fast, direct Internet access via standard telephone lines. |
| E-portfolio | A collection of an individual's work accessible via the Web. |
| Fixed wireless Internet access | Fast, direct Internet access available in some areas via the airwaves. |
| Instant messaging (IM) | A way of exchanging real-time typed messages with other individuals. |
| Internet | The largest and most well-known computer network, linking millions of computers all over the world. |
| Internet content provider | A person or an organization that provides Internet content. |
| Internet filtering | Using a software program or browser option to block access to particular Web pages or types of Web pages. |
| Internet service provider (ISP) | A business or other organization that provides Internet access to others, typically for a fee. |
| Keyword | A word typed in a search box on a search site or other Web page to locate information related to that keyword. |
| Keyword search | A type of Internet search where keywords are typed in a search box to locate information on the Internet. |
| Message board | A Web page that enables individuals to post messages on a particular topic for others to read and respond to; also called a discussion group or online forum. |
| Mobile wireless Internet access | Internet access via a mobile phone network. |
| Online auction | An online activity where bids are placed for items, and the highest bidder purchases the item. |
| Online banking | Performing banking activities via the Web. |
| Online gaming | Playing games via the Web. |
| Online investing | Buying and selling stocks or other types of investments via the Web. |
| Online movies | Feature films available via the Web. |
| Online music | Music played or obtained via the Web. |
| Online shopping | Buying products or services over the Internet. |
| Online TV | Live or recorded TV shows available via the Web. |
| Online video | Video watched or downloaded via the Web. |
| Podcast | A recorded audio or video file that can be played or downloaded via the Web. |
| Portal Web page | A Web page designed to be designated as a browser home page; typically can be customized to display personalized content. |
| RSS (Really Simple Syndication) | A tool used to deliver selected Web content to subscribers as the content is published to a Web site. |
| Satellite Internet access | Fast, direct Internet access via the airwaves and a satellite dish. |
| Search engine | A software program used by a search site to retrieve matching Web pages from a search database. |
| Search site | A Web site designed to help users search for Web pages that match specified keywords or selected categories. |
| Social networking site | A site that enables a community of individuals to communicate and share information. |
| Spyware | A software program that is installed without the user's permission and that secretly gathers information to be sent to others. |
| Text messaging | A way of exchanging real-time typed messages with other individuals via a cellular network and, typically, cell phones. |
| Twittering | Sending short status updates about your current activities via the Twitter service. |
| Video-on-demand (VOD) | The process of downloading movies and television shows, on demand, via the Web. |
| Voice over Internet Protocol (VoIP) | The process of placing telephone calls via the Internet. |
| Web conference | A face-to-face meeting taking place via the Web; typically uses video cameras and microphones to enable participants to see and hear each other. |
| Web service | A self-contained business application that operates over the Internet. |
| Web-based training (WBT) | Instruction delivered on an individual basis via the Web. |
| Webinar | A seminar presented via the Web. |
| Wi-Fi hotspot | A location that provides wireless Internet access to the public. |
| Wiki | A collaborative Web page that is designed to be edited and republished by a variety of individuals. |
| World Wide Web (WWW) | The collection of Web pages available through the Internet. |
| Antivirus software | Software used to detect and eliminate computer viruses and other types of malware. |
| Biometric access system | An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual. |
| Bot | A computer that is controlled by a hacker or other computer criminal. |
| Botnet | A group of bots that are controlled by one individual. |
| Computer crime | Any illegal act involving a computer. |
| Computer sabotage | An act of malicious destruction to a computer or computer resource. |
| Computer virus | A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system. |
| Computer worm | A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. |
| Cyberbullying | Children or teenagers bullying other children or teenagers via the Internet. |
| Cyberstalking | Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method. |
| Denial of service (DoS) attack | An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. |
| Digital certificate | A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures. |
| Digital signature | A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. |
| Dot con | A fraud or scam carried out through the Internet. |
| Encryption | A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it. |
| Firewall | A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access. |
| Hacking | Using a computer to break into another computer system. |
| Identity theft | Using someone else's identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. |
| Malware | Any type of malicious software. |
| Online auction fraud | When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. |
| Password | A secret combination of characters used to gain access to a computer, computer network, or other resource. |
| Pharming | The use of spoofed domain names to obtain personal information to be used in fraudulent activities. |
| Phishing | The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes. |
| Possessed knowledge access system | An access control system that uses information only the individual should know to identify that individual. |
| Possessed object access system | An access control system that uses a physical object an individual has in his or her possession to identify that individual. |
| Private key encryption | A type of encryption that uses a single key to encrypt and decrypt the file or message. |
| Public key encryption | A type of encryption that uses key pairs to encrypt and decrypt the file or message. |
| Secure Web page | A Web page that uses encryption to protect information transmitted via that Web page. |
| Security software | Software, typically a suite of programs, used to protect your computer against a variety of threats. |
| Spear phishing | A personalized phishing scheme targeted at an individual. |
| Trojan horse | A malicious program that masquerades as something else. |
| Two-factor authentication | Using two different methods to authenticate a user. |
| Unauthorized access | Gaining access to a computer, network, file, or other resource without permission. |
| Unauthorized use | Using a computer resource for unapproved activities. |
| Virtual private network (VPN) | A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. |
| War driving | Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. |
| Wi-Fi piggybacking | Accessing an unsecured Wi-Fi network from your current location without authorization. |
| Computer monitoring software | Software that can be used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed. |
| Digital counterfeiting | The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items. |
| Disaster recovery plan | A written plan that describes the steps a company will take following the occurrence of a disaster. |
| E-mail filter | A tool that automatically sorts your incoming e-mail messages based on specific criteria. |
| Electronic profiling | Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. |
| Employee monitoring | Observing or reviewing employees' actions while they are on the job. |
| Full disk encryption (FDE) | A technology that encrypts everything stored on a storage medium automatically, without any user interaction. |
| Government database | A collection of data about people that is collected and maintained by the government. |
| Hardware theft | The theft of computer hardware. |
| Information privacy | The rights of individuals and companies to control how information about them is collected and used. |
| Marketing database | A collection of data about people that is stored in a large database and used for marketing purposes. |
| Opt in | To request that you be included in marketing activities or that your information be shared with other companies. |
| Opt out | To request that you be removed from marketing activities or that your information not be shared with other companies. |
| Presence technology | Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network. |
| Privacy | The state of being concealed or free from unauthorized intrusion. |
| Privacy policy | A policy, commonly posted on a company's Web site, that explains how personal information provided to that company will be used. |
| Ruggedized device | A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than its conventional counterpart. |
| Self-encrypting hard drive | A hard drive that uses full disk encryption (FDE). |
| Software piracy | The unauthorized copying of a computer program. |
| Spam | Unsolicited, bulk e-mail sent over the Internet. |
| Spam filter | An e-mail filter used to redirect spam from a user's Inbox. |
| Surge suppressor | A device that protects a computer system from damage due to electrical fluctuations. |
| System failure | The complete malfunction of a computer system. |
| Throw-away e-mail address | An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem. |
| Uninterruptible power supply (UPS) | A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out. |
| Video surveillance | The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. |