A small program designed to be run within another application.
Ecommerce transactions between business and consumer.
Ecommerce transaction between businesses.
A device that uses some unique characteristics of human biology to identify other users.
Personal log or journal posted on the web.
Exploiting a flaw in the Bluetooth access software for the purpose of accessing a Bluetooth device and stealing the information contained on it.
A type of wireless technology that uses radio waves to transmit data over short distances.
A list that shows the hierarchy of previously web pages within the website that you are currently visiting.
A way of describing typical network functions.
The process of using the internet to deliver business, entertainment, or other services that were previously delivered by conventional means
A computer that hosts software that enables consumers to purchase goods and services over the web.
The application of computer systems and techniques to gather potential legal evidence. Used to fight high-tech crime.
Being familiar with computers to understand their capabilities and limitations and know how to operate them.
A set of rules for accomplishing electronic information exchange.
Any criminal action perpetrated primary through the use of computer.
Doing anything with a computer that isn't related to the job. (Such as playing games)
The discrepancy between those who have access to computer and the inter and those who don't.
A home that has computers and digital devices that all connect to a home network.
The host and suffix. Example: facebook.com
A server that processes incoming and outgoing emails.
A computer deployed to provide remote storage space or to act as a repository for files that users can access.
A software or hardware used to prevent unauthorized access to computers or networks.
File Transfer Protocol (FTP)
A protocol used to upload and download files from one computer to another over the internet.