Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

IC3 Unit 3 Chapters 1-5 Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
the primary data routes connnected by networks and routers that transmit data over the Internet   backbone  
🗑
the amount of data that can be transmitted in a fixed amount of time, usually measured in bits per second (bps)   bandwidth  
🗑
the practice of analyzing body characteristics for identification such as a fingerprint   biometrics  
🗑
the process of sending several signals over the same medium using different frequencies   broadband  
🗑
a program that requests and displays Web pages   browser  
🗑
a device that connects a computer to broadband Internet service using the same service that supplies cable television signals   cable modem  
🗑
a Web browser developed by Google   Chrome  
🗑
a computer connected to a server in a client/server network   client  
🗑
cable consisting of a copper wire surrounded by a layer of insulation   coaxial cable  
🗑
a type of Internet connection that uses a modem to transmit data over a traditional analog telephone line   dial-up  
🗑
a type of Internet subscriber line or connection using broadband   digital subscriber line (DSL)  
🗑
a text version of an web address that identifies the server or an entity   domain name  
🗑
a computer that maintains a current list of domain names and IP address of the host computers   domain name server  
🗑
short for electronic mail, it is a way to transmit messages over a communications network   e-mail  
🗑
the most common network standard that uses copper wire   Ethernet  
🗑
thin, flexible, glass fibers inside a protective covering referred to as fiber that transmit information at high speeds using light   fiber optic cable  
🗑
one of the protocols included in TCP/IP that enables users to transfer files between computers and servers   File Transfer Protocol (FTP)  
🗑
software and/or hardware on a network that blocks unwanted types of outside traffic and prevents unauthorized access to a network   firewall  
🗑
a computer that delivers Web pages or files that is often referred to as a Web server   host  
🗑
text or graphic links that take the user to a different Web page or location   hyperlink  
🗑
a markup language used to develop Web content that describes to the browser how text and objects should be displayed   HTML  
🗑
a set of rules that is the standard for transferring files over the Internet   HTTP  
🗑
a Web browser developed by Microsoft Corporation   Internet Explorer  
🗑
a string of numbers separated by periods that uniquely identifies each computer (or device) connected to the Internet   Internet Protocol (IP) address  
🗑
a company whose host computer has its own IP address that supplies Internet connectivity to individual and/or business customers and that can communicate with other computers on the Internet using TCP/IP standards   Internet service provider (ISP)  
🗑
a network that uses Web page servers and Internet protocols but is isolated from the public Internet and requires authentication for access   intranet  
🗑
the delay time in download speeds particularly when using earth-to-satellite connections and is especially noticeable in video conferencing and gaming applications   latency  
🗑
a network restricted to a confined area (such as a single building or campus) that connects computers and peripheral devices   local area network (LAN)  
🗑
a Web browser developed by Mozilla Corporation   Mozilla Firefox  
🗑
a group of devices connected to each other that might include computers, peripherals, and mobile devices   network  
🗑
a network element such as a computer, scanner, printer or any electronic device attached to a network   node  
🗑
a secret set of letters, numbers, and symbols used in combination with a user name to complete a login process   password  
🗑
a network of computers that are connected to each other as equals that do not require a server   peer-to-peer  
🗑
a Web browser developed by Apple Inc.   Safari  
🗑
a computer that provide services to other computers   server  
🗑
sending content over the Internet in compressed form and making it available for the user in real time without the need to first download and store the content   streaming  
🗑
a computer professional who issues and/or sets standards for company user names and passwords and also determines the level of file access on the network as well as manages and maintains the software on a server   system administrator  
🗑
a type of high-speed connectivity offered by telephone companies that uses twisted pairs of copper telephone lines in bundles of 24 lines that represent 24 channels of data and has the capacity to transmit data at a rate of 1.5 mbps   T1  
🗑
a suffix for every domain that indicates the group to which it belongs   top-level domain (TLD)  
🗑
the two major protocols for transmitting packets across the Internet   Transmission Control Protocol/Internet Protocol (TCP/IP)  
🗑
pairs of copper wire that are insulated and twisted together and reduce electrical interference; most often used for telephone and LAN wiring   twisted pair  
🗑
an addressing system devised to provide each node on the Internet with a unique address   uniform resource locator (URL)  
🗑
a unique name on a network assigned to a user that is used in conjunction with a password to access network resources   user name  
🗑
a document written using HTML and displayed by a Web browser   Web page  
🗑
a network that covers a large geographic area often using multiple LANs; the Internet is an example of a WAN   wide area network (WAN)  
🗑
a method of connection involving radio signals without wired connections   wireless  
🗑
an international network of computers that uses HTTP to transfer documents written using HTML   World Wide Web  
🗑
programs similar to plug-ins that extend the capabilities of an existing application   add-on  
🗑
a dialog box that is usually located near the top of a browser window and is used to type in a Web address or edit a Web address   address box  
🗑
a browser feature that, when turned on, automatically completes Web addresses as the user types them if the address has been visited previously, allowing the user to quickly choose the address without typing the full Web address   AutoComplete  
🗑
a stored link to a Web page in Mozilla Firefox   bookmark  
🗑
logical value operators AND, OR, and NOT developed in the 1800s by George Boole that, when used by search engines, enable an Internet search to be narrowed or expanded   Boolean logic  
🗑
link on a Web page that, when clicked, redirects the user to another Website; ethical search engines clearly label sponsored links   click through  
🗑
Exclusive right to makes copies of literary, musical, or artistic work   copyright use  
🗑
The right to use copyrighted work in part even against the permission of the copyright holder with proper citation   fair use  
🗑
a stored link to a Web page in Internet Explorer   Favorites  
🗑
Web pages used to post messages that are related to a particular topic   forum  
🗑
a popular search engine used on the Web, also used as a verb to describe using the search engine to find information as in “I googled the Olympics”   Google  
🗑
a preselected Web page that displays the main page for a Website   home page  
🗑
text or graphic links that take the user to a different web page or location when the link is activated by a mouse click, a keyboard, or touch on a touch screen   hyperlink  
🗑
the default page of a Website that appears when a website is accessed; also an electronic organization of Websites by search engines   index  
🗑
any creative work that is the property of its creator or author and is protected by copyright   intellectual property  
🗑
using a few related words to conduct a search for Websites   keyword search  
🗑
a way to share computer code that provides the computer program in a readable format that others may use, usually without paying royalties   open-source  
🗑
a method of categorizing Web pages popularized by Google that returns Web pages that were most referred to by other Web pages   page ranking  
🗑
legal provision that provides protection for the idea behind an invention   patent  
🗑
window, typically containing an ad or other unwanted content, that covers a portion of the Web page the user is trying to read; pop-ups may be disabled in most browser software   pop-up  
🗑
a Web page that contains several types of useful information plus links to other sites that functions as a one-stop shop for a topic or organization   portal  
🗑
the process that forces the browser to request a new copy of the Web page from the Web server instead of recalling the copy it stored previously in the computer’s cache   refresh  
🗑
a combination of Web crawlers with indexing, classifying, and ranking programs that allows users to make requests to search for information on the Internet   search engine  
🗑
a paid advertisement that links to the site by having it appear in search engine results, usually based on key words used in the search   sponsored link  
🗑
a word or symbol that indicates ownership of a product or service and that its use is reserved for the owner   trademark  
🗑
a group of related Web pages   Website  
🗑
programs that are supported by Microsoft’s Internet Explorer browser to provide additional functionality to websites such as the display of a calendar for users to specify a date or to be sure a form was completed correctly   ActiveX  
🗑
a program for use by marketers that tracks your Web browsing; software that facilitates advertising   adware  
🗑
a machine that is provided by many banking institutions to offer banking services 24 hours a day / 7 days a week in a variety of locations, including malls, grocery stores, and theme parks   automatic teller machine (ATM)  
🗑
e-commerce between two businesses   business-to-business (B2B)  
🗑
e-commerce between a business and a consumer   business-to-consumer (B2C)  
🗑
an entity issuing digital certificates to individuals and enterprises that establishes credentials to nodes on the Web   certificate authority (CA)  
🗑
e-commerce between consumers   consumer-to-consumer (C2C)  
🗑
small text file stored on a computer and used to compile browsing history   cookie  
🗑
changing encrypted messages back to the original message so it is useable   decryption  
🗑
an electronic signature created by using a private key to encrypt data that uniquely characterizes the program that is used by a Web browser to authenticate programs and encrypt e-mail messages   digital signature  
🗑
business and consumer transactions conducted online   electronic commerce (e-commerce)  
🗑
the process of changing a message into a code that is not easily understood by unauthorized individuals   encryption  
🗑
a digital device designed specifically to display book contents, like the Kindle and the Nook   e-reader  
🗑
a private network that uses encryption methods to securely deliver information over the Internet, such as UPS’s online package tracking application   extranet  
🗑
a secure protocol used to transport Web pages that indicates the Web server is using Hypertext Transfer Protocol over Secure Sockets Layer   Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)  
🗑
obtaining key pieces of information to impersonate someone allowing access to bank accounts and other information specific to an individual that is a crime punishable by law   identity theft  
🗑
when someone impersonates a business to try and get personal information   phishing  
🗑
communication protocol used to standardize encryption/decryption methods by utilizing both a public key and a private key to provide secure data transport   Secure Socket Layer (SSL)  
🗑
an option provided by a website for the buyer to keep track of items selected for online purchasing   shopping cart  
🗑
a program that runs in the background without the user’s knowledge and gathers information from the computer, such as a user’s browser history or cookie information   spyware  
🗑
storage area for frequently used e-mail addresses that can be accessed from the e-mail fields To, Cc, and Bcc   address book  
🗑
removing e-mail messages from active use and placing them on a computer’s or a server’s storage   archiving  
🗑
a program (sometimes included in a rootkit) that allows an intruder to bypass normal system security to communicate with the system and take control of the computer   backdoor  
🗑
the e-mail address(es) of the recipient(s) from the primary e-mail recipient(s)   blind carbon copy (Bcc)  
🗑
an online journal, log, or diary that often reflects the political, social, religious, or other personal views of an individual and sometimes contains images, videos, and links to other (See Weblog)   blog  
🗑
a community of interconnected blogs or the world of blogs   blogosphere  
🗑
area of an e-mail compose window that is used to type the text of an e-mail message   body  
🗑
a temporary memory location where processed data are held until the data can be delivered to a device   buffer  
🗑
a visually distorted word or phrase translated by users that is difficult for a computer to translate and provides increased security for a website   CAPTCHA  
🗑
the e-mail address(es) of the recipient(s) who will receive a duplicate copy (courtesy copy) of an e-mail message   carbon copy (Cc)  
🗑
a basic form of conferencing over the Internet with a live message center where text-based exchanges take place between users who are active at the same time   chat  
🗑
a law that protects information provided by children under 13 years old   Children’s Online Privacy Protection Act (COPPA)  
🗑
a place where you can eat and/or drink and connect to the Internet   cyber-café  
🗑
an attack on a network by malware that floods servers with more service requests than the servers can handle, making it impossible for the overloaded server to provide service to clients   denial of service (DOS)  
🗑
classrooms that use communications technology to reach students who are not physically present in the classroom   distance education  
🗑
learning that utilizes a computer for delivering instruction   e-learning  
🗑
similar to regular mailing lists you would use to create with an address book available from online vendors   electronic mailing list (e-list)  
🗑
keyboard representations of facial expressions or tiny graphics such as happy faces used in electronic messages   emoticons  
🗑
a markup language specification designed specifically for Web development that allows developers to customize their own markup tags; designed to carry data, not to display data   Extensible Markup Language (XML)  
🗑
normally a three-letter code at the end of a filename following the period that designates the type of the file   file extension  
🗑
hostile comments or insults initiated in any form of online communication   flame  
🗑
a series of flames or hostile exchanges initiated using online communication tools   flame war  
🗑
an option available in an e-mail client that allows the recipient of it to send the e-mail to one or more other people   forward  
🗑
a lie that is intended to convince its audience that something is real when it is not; often distributed via forwarded e-mail alerts   hoax  
🗑
a text-based service that allows users to communicate directly when all users are online at the same time   instant messaging (IM)  
🗑
publications of false and malicious information for the purpose of defaming a living person   libel  
🗑
software programs that are designed with malicious intent   malware  
🗑
a Web-based version of a discussion list including postings and related responses displayed together (aka Internet forum)   message board  
🗑
an updated version of SMS to send audio and video files using mobile devices that requires the sending and receiving devices to have Internet access   Multimedia Messaging Service (MMS)  
🗑
rules that describe appropriate behavior on the Internet   netiquette  
🗑
a program that automatically installs and modifies the operating system to repair flaws   patch  
🗑
additional code contained in a virus that is intended to operate on the host computer   payload  
🗑
a file (usually audio) that is distributed through Web feeds specifically designated to play on portable devices including the iPod iPad and smartphones   podcast  
🗑
a type of file developed by Adobe Systems for ease of sharing files over the Internet that maintains the formatting, graphics, and layout of a document   Portable Document Format (PDF)  
🗑
acronym to describe XML files that are created for frequently updated information such as blogs, news headlines, and sports scores   Really Simple Syndication (RSS)  
🗑
respond to the sender of an e-mail message.   reply  
🗑
an e-mail option that allows the user to respond to the sender of the message and all other recipients of the e-mail message   reply all  
🗑
a wireless service for sending brief messages that is used in texting software usually found on mobile phones   Short Message Service (SMS)  
🗑
a type of blog that is a portfolio of drawings or sketches   sketchlog  
🗑
oral false statements that are harmful to a person’s reputation and are often hard to prove   slander  
🗑
a group of people that might include family, friends, or people with similar interests who share information that is facilitated by Internet applications like Facebook and Google+   social network  
🗑
unsolicited bulk e-mail messages that are offensive or waste the user’s time   spam  
🗑
a malicious tactic that sends messages to members of the contact list and disguises the origin of the message by replacing the e-mail owner’s name with names from the owner’s contact list in the sender field   spoofing  
🗑
a malicious program that spreads by tricking users into granting permission to install it by pretending to be something else   Trojan  
🗑
an message of 140 characters or less posted using the Twitter online information network   tweet  
🗑
a program that is capable of tricking its host into using its resources to make copies of itself and distribute them to other hosts without their consent   virus  
🗑
the process of coding telephone conversations into packets of compressed data, transmitting the packets over the Internet, and then decoding them fast enough to make synchronous conversations possible   Voice over Internet Protocol (VoIP)  
🗑
a digital camera connected to or built-in to a computer or mobile device that allows images to be transmitted in real time over the Internet   webcam  
🗑
a server program that allows users to collaborate to create the content of a website   wiki  
🗑
a program that can duplicate itself and spread by sending copies of itself to other computers on a network   worm  
🗑
a searchable video-sharing service that allows anyone to upload videos for private or public viewing   YouTube  
🗑
move e-mail messages from active folders to a folder stored on a computer or a folder placed on removable storage media for long–term storage, providing a way to access the messages at a later date   archive  
🗑
a Microsoft Outlook rule that automatically sends e-mail addressed to a recipient to another e-mail address designated by the recipient   auto-forward  
🗑
a response that is set up by a Microsoft Outlook user to automatically reply to all e-mail messages such as an out-of-office notice   auto-response  
🗑
a form of unsolicited e-mail forwarded to a group of users asking those users to forward it to more people, and that can consume e-mail resources   chain e-mail  
🗑
a type of social media marketing measurement that tracks how often a Web site has been accessed from a link on another Web site   click-through  
🗑
an item of information in the Microsoft Outlook e-mail client that can be displayed when e-mail messages are listed   column  
🗑
the applied science of equipment design to reduce operator fatigue and discomfort   ergonomics  
🗑
a computer programmer who uses his skills to access computers and steal data   hacker  
🗑
using a separate group located within the same country to provide a service   insourcing  
🗑
unsolicited or unwanted e-mail   junk e-mail  
🗑
a U.S. government agency within the Department of Labor that is responsible for worker safety and health standards and provides guides on the Web to analyze computer workstations to avoid computer-related injury   Occupational Safety and Health Administration (OSHA)  
🗑
use of communication technologies to facilitate the employment of workers in another country to provide services   outsourcing  
🗑
a courteous recognition used to begin a message, like addressing an intended recipient using Dear Casey or Dear Mrs. Ricker   salutation  
🗑
information that is automatically added to the end of an e-mail message such as contact information   signature block  
🗑
when employees who work from home use electronic communications to connect to the office   telecommute  
🗑
a secure connection between two computers that uses encryption techniques and is used for telecommuting   virtual private network (VPN)  
🗑
teams that work using communications technologies but are separated by distance and time   virtual team  
🗑
command prompt action that displays the current info about network: IP address of computer, IP address of router, Domain Name Server   ipconfig  
🗑
command prompt action that sends signals to another device to see if it is active   ping  
🗑
command prompt action that let's you see step-by-step routes a packet takes before getting to a destination   tracert  
🗑
command prompt action that will fetch Domain Name Server records for domain name or IP Address   nslookup  
🗑
Top Level Domain of a commercial website   .com or .net  
🗑
Top Level Domain of a non-profit website   .org  
🗑
Top Level Domain of a an educational website   .edu  
🗑
Top Level Domain of a government owned website   .gov  
🗑
Global System of interlinked hypertext documents   Internet  
🗑
Unauthorized reproduction or use of a copyrighted book, recording, or other work.   Piracy  
🗑
Restriction of access to certain content on the web.   Web Filtering  
🗑
Encryption scheme included in first generation of wireless equipment   WEP  
🗑
Encryption code used as a security feature   Passphrase  
🗑
Identifier of a Wireless Network   SSID  
🗑
Security-enhanced encryption technology used for wireless networking   WPA  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: nicole.anderson
Popular Computers sets