Create an account
Internet .VS. WWW
The internet is a network of networks. Where as the WWW is a way in which we use these networks to access information.
Business to Consumer, Business to Business, Consumer to Consumer. The use of the Internet for financial transactions.
A bit of data that allows businesses to track your preferences on the internet. Often help decide which ads to be sent.
Malicious Software- Software designed to infiltrate a computer without the consent of the owner.
a reference to a document that the reader can directly follow, or that is followed automatically
a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Client VS Server
A client is a consumer or individual a server is the company supplying the connection to the internet
a set of rules that ensures the orderly and accurate transmission and reception of data
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.
HyperText Transfer Protocol are the rules computers use to transfer web pages across the Internet.
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation
A program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program
Intellectual Property Rights
concept that says that a particular group may determine how indigenous knowledge and its products may be used and distributed and the level of compensation required
the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
-Computer network:Two or more computers connected together
-Devices connected to networks: nodes
-Benefits of a network: Sharing resources, Transferring files
Peer to Peer Network
-Network where a few computers share hardware and information & All computers are equal, and each can have access to devices and files on the others
-Each computer independently stores its own software and information, but can access the information on the other computers
-All computers can access devices connected to any of the other computers
-Used mainly at home & small offices
Client Server Network
-A network in which one or more computers are servers and provide services to the other computers, which are called clients
-Servers have hardware, software, and/or information that the client computers can access
-Servers are usually powerful computers with large storage systems
Local Area Networks- Nodes are within a small geographic region: Homes, Schools, Small businesses
Wide Area Networks- LANs connected over long distances: A few miles to thousands of miles using telecommunications lines
a card or software that enables a laptop computer to send and receive data over a network.
-Receive retransmit data to nodes on the same network
-Sends messages only to the computer that is the intended recipient
-Can handle multiple communications channels at the same time
-Can temporarily segment parts of the network with high traffic from the rest of the network
-Connects computers into a network, and also connects dissimilar networks together
-Can handle multiple communications channels
a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
Protocol for Wireless Communication
-Uses radio waves to connect nodes
-Basically an Ethernet network that uses radio waves instead of wires
Each node requires a wireless network adapter: Transceivers
a proprietary open wireless protocol for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs).
-Anyone who unlawfully accesses a computer system
-Types of hackers:
Process to create Database
Create proper structure and definitions, -What entities do you want to store information about, -What fields do you want to store about those entities, - I.D. the Key field, -Normalize, -Establish relationships between the tables
Diff. Table Relations
1-1, 1-Many, Many-Many (if many-many occurs you create another table to make them 1-many)
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together