click below
click below
Normal Size Small Size show me how
Arkansas CT Unit 3
Unti 3 Terms Arkansas Computer Technology Introduction
| Question | Answer |
|---|---|
| a feature of some email applications that stores names and email addresses in an accessible format | Address Book |
| type of software that can process information on its own without human intervention | Artificial Intelligence |
| software program used to retrieve document from the World Wide Web (WWW or Web) and to display them in a readable format | Browser |
| a storage location on a computer’s hard disk used to temporarily store Internet files | Cache |
| a computer that uses the services of another program | Client |
| criminal act committed through the use of a computer, such as getting into someone else’s system and changing information or creating a computer virus and causing damage to others’ information | Computer Crime |
| manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss | Computer Fraud |
| using the computer for learning and instruction | Computer-based Learning |
| small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie files are stored on your computer | Cookies |
| the exclusive right granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work | Copyright |
| identifies a site on the Internet | Domain Name |
| business conducted over the Internet; also called e – commerce | Electronic Commerce (e-commerce) |
| transmission of electronic messages over networks | Electronic Mail (e-mail) |
| a network configuration that allows selected outside organizations to access internal information systems | Extranet |
| invading someone else’s computer, usually for personal gain or just for the satisfaction of invading someone else’s computer | Hacking |
| any time a piece of data matches search words you specify | Hits |
| first page that is displayed when a browser is launched | Home Page |
| a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices | Hub |
| protocol that controls how Web pages are formatted and displayed | Hypertext Markup Language (HTML) |
| protocol that defines how messages are formatted and transmitted over the World Wide Web | Hypertext Transfer Protocol (HTTP) |
| the crime of obtaining someone else’s personal data and using it for financial gain or to defraud or deceive | Identity Theft |
| the largest network used as a communication tool | Internet |
| a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization | Intranet |
| words that describe the information the user is trying to locate | Keywords |
| ability to move through a Web page | Navigation |
| often used to describe rules for proper online behavior | Netiquette |
| discussion forum or a type of bulletin board | Newsgroup |
| claiming someone else’s words as your own | Plagiarism |
| information or content to which copyright protection does not apply and that is available for anyone to copy | Public Domain |
| a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination | Router |
| software program used to search the Internet through the use of keywords | Search Engine |
| a computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients) | Server |
| the illegal copying or use of computer programs | Software Piracy |
| unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called “junk” e-mail | Spam |
| program that searches the Web; called a spider because it crawls all over the Web | Spider |
| address that tells the browser where to locate the page; it is typed into the address bar | Uniform Resource Locator (URL) |
| an artificial environment used in education, medicine, training, research, and other fields | Virtual Reality |
| input devices that are used to issue spoken or voice commands to the computer | Voice Recognition |
| computer that houses and delivers Web pages | Web Server |
| the asterisk ( * ) symbol; used to search for words that the user is not sure how to spell or for word variations | Wildcard Character |
| computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks | Worm |