Advertisement Upgrade to remove ads

CERN

"Center for european Nuclear Research" - where Tim Berners-lee invented a standard programming language

Homepage

Typically called "index"

Uniform Reasearch Locaters (URL)

the address of a website and have components that make it up

Browser Application Software

What displays the website

Design (132)

A good design of a website can be a customer's initial impression of a business

Bookmarks

also call "favorites"; will catalog your favorite URL's that the user has visited or plans to visit, so the user doesn't have to remember the page URL.

Cookies

Text files sent to a browser and then sent back unchanged by the browser to the originating server. Used for tracking and maintaining specific information.

Java Script

client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page

Popup blockers

settings to disallow popups

Usability

ease of use of a browser

Broadband

high data-transmission rate internet connection

Directory Searches

a search engines organized into directories like medicine or automotive so the user can search only within a particular area

Rules of Business

need a very capable management team, a well-organized business structure, good customer service, inventory controls, and much more

IT Competencies

e-commerce websites need to provide an easy, secure way to handle transactions while remaining attractive and very easy to use and navigate.

Cc (Carbon Copy)

option in emailing that offers the ability to copy more than one recipient and lets all of the recipients know who else has received the same email.

BCC (Blind Carbon Copy)

distribution option works like the carbon copy except none of the recipients know who else received the same email, or whether anyone other than them received it at all

TOS (terms of service agreement)

email server owners rules that specifically outlines email usage and protocols. Don't say or type anything in an email that you wouldn't be willing to say in public.

Telephony

encompasses the general use of equipment to provide voice communication over distances, specifically by connecting telephones to each other

Tim Berners-Lee

invented a standard programming language called HTML and the protocol to move information through the internet called HTTP

Connectivity

the ability to link various media and devices, thereby enhancing communication and improving access to information

Risk Management

the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them.

Hacker

someone who attempts to evade or disable a computer's security measures, and then steals computer resources at their leisure

Unsecure Computer

extremely easy to breach, especially by a seasoned hacker

Purchase Scams

The most uncomplicated type of internet fraud. Involve a buyer typically in another country that approaches merchants via spam and asks if they can pay for shipping with a credit card. Once the order is shipped, the credit card is cancelled and the shipping company receives a charge back and loses all of their money from the other.

Tracking Cookie

a copy of a webpage was sent from the book seller's server to your computer(client). the server also sent a small text file called a cookie that the user is typically unaware of

Data Mining

when experts extract useful data and information from recorded data like a cookie.

History Files

a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the web.

Internet

a client-server model

Arpanet (advanced Research Project Agency Network)

One of the precursors to today's internet

HTML (Hypertext Markup Language)

standard programming language

Web browser

application software that provides an interface which lets a user display and interact with text, images, and other information located on the WWW.

HTTP

the protocol to move information through the internet

The largest network

the internet

Client/Server Model

that the internet network is called; a computer on a network that stores web pages is called the server or host. The computer on the network that requests those Web pages is called a client. A computer can be both a client and a server at the same time

IP Address (Internet Protocol)

One of the two core internet standards. IP defines the standard that describes how an internet-connected computer should break data down into packets for transmission across the network. In other words an address system to identify and communicate throughout the network.

Domain name

"www.yahoo.com

Webmaster/web developer

People that produce a website

Caching

when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the WWW

Graphic files (GIF and JPEG)

how web browsers display images

JavaScript

client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page.

Client side program

programs that enable users to access a certain type of data

ISP (internet Service Provider)

a business or organization that provides people a way to access the internet and WWW.

Search engine

website that lets a user type in specific keywords then returns list of hyperlinks

Metasearch engines

look and work like keyword searches, but return results of many search engines at once an eliminate duplicate hits

E-Commerce

distributing, buying, selling, advertising, and marketing of goods or services over the web.

Business-to-business

E-commerce to other businesses; inclines to take place within specific categories

Business-to-consumer

where commercial organizations sell to consumers

consumer-to-consumer

involves e-commerce between consumers, usually facilitated by some third party

Rules of Business

need a very capable management team, a well organized business structure, good customer service, inventory controls, and much more

Market Research

Research any business needs to ask for success

Streamline Business Process

How you do business on the web

Agility

allows for website reengineering, and even an entire business facelift far faster than conventional businesses

Browser Hijacking

When the browser's settings are modified by Malware

Malware

software designed to damage a computer's system without the owner's knowledge

Worm

like a virus in that is spreads quickly and is extremely harmful, but does not need to attach itself to an existing program. They are self-replicating, they harm networks

Trojan Horse

is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a user's system

Adware

software which routinely displays advertising to a computer system after the software is installed, usually without the user's consent

Virus

malicious computer program that can copy itself and infect a computer, typically without the user being aware of it

Elements of an email

Subject, attachment, header

Email Security

Watch out for stuff like phishing

Spam

any unwanted mail like phishing; emails can range from simple advertising to phishing schemes

VoIP (Voice over internet Protocol)

the routing of voice conversations, or typically phone calls over the internet

Intranet

like a private version of the internet that works the same way as the internet but is confined within an organization

Firewall

specialized hardware and software working together that insures that only authorized personnel within an organization can use the internet

Content

Most important part of a website

Interactivity

Second most important part of a website

communication

most important part of the INTERNET

Risk Management

the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them.

DoS Attack

(Denial of Service attack); most harmful, an attempt to make a computer or any of its resources unavailable to its intended users

Reverse Phishing/Keylogging

a relatively new form of malware, key logging is when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard

System Patches

operating system protecting their user's operating systems by automatically offering online updates that have been identified as security threats in the operating system itself

Internet Fraud

any fraudulent activity on the internet (credit card theft)

Anonymous and Anonymity

one's personal identity is not known, You are really participating in your own loss of privacy when you use the internet

Dumpster Diving

Criminals look through trash to get your information

SCAM

Be "STINGY" about giving out personal information. "CHECK" your financial information on a regular basis and look what should and shouldn't be there. "ASK" periodically for your credit report. "MAINTAIN" careful records of your banking and financial records.

Identity Theft

a crime concerning the unlawful practice of assuming another individual's identity, and it is one of the fastest growing crimes in the US and Canada.

large database online

facebook is worth billions of dollars because it has a...

Head Elements

typically define a web document's title, style, and <META> tags.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set