Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

Internet .VS. WWW

The internet is a network of networks. Where as the WWW is a way in which we use these networks to access information.

Inventor of the Internet

Tim Berners Lee

e Commerce

Business to Consumer, Business to Business, Consumer to Consumer. The use of the Internet for financial transactions.


A bit of data that allows businesses to track your preferences on the internet. Often help decide which ads to be sent.

Mal ware

Malicious Software- Software designed to infiltrate a computer without the consent of the owner.


a reference to a document that the reader can directly follow, or that is followed automatically

2 inventions leading to internet boom

Hypertext and Web Browsers


a Uniform Resource Locator (URL) is a subset of the Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.

Client VS Server

A client is a consumer or individual a server is the company supplying the connection to the internet

Communications Protocol

a set of rules that ensures the orderly and accurate transmission and reception of data


The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.


HyperText Transfer Protocol are the rules computers use to transfer web pages across the Internet.

IP Address

a number that uniquely identifies each computer or device connected to the Internet

Slowest connection to the internet

Dial Up

What is an Internet service provider

A company that provides a connection to the internet

Previous Internet Name



a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation


Language of the websites


A program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program


A virus that spreads through a network from node to node

Intellectual Property Rights

concept that says that a particular group may determine how indigenous knowledge and its products may be used and distributed and the level of compensation required

Identity Theft

the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge


-Computer network:Two or more computers connected together
-Devices connected to networks: nodes
-Benefits of a network: Sharing resources, Transferring files

Peer to Peer Network

-Network where a few computers share hardware and information & All computers are equal, and each can have access to devices and files on the others
-Each computer independently stores its own software and information, but can access the information on the other computers
-All computers can access devices connected to any of the other computers
-Used mainly at home & small offices

Client Server Network

-A network in which one or more computers are servers and provide services to the other computers, which are called clients
-Servers have hardware, software, and/or information that the client computers can access
-Servers are usually powerful computers with large storage systems


Local Area Networks- Nodes are within a small geographic region: Homes, Schools, Small businesses


Wide Area Networks- LANs connected over long distances: A few miles to thousands of miles using telecommunications lines

Network Interface

a card or software that enables a laptop computer to send and receive data over a network.


Connects computers in a network
SIMPLEST form of connecting computers.


-Receive retransmit data to nodes on the same network
-Sends messages only to the computer that is the intended recipient
-Can handle multiple communications channels at the same time
-Can temporarily segment parts of the network with high traffic from the rest of the network


-Connects computers into a network, and also connects dissimilar networks together
-Can handle multiple communications channels

Cabling VS Wireless

Cat 5, Twisted Pair VS Radio waves, WiFi and Bluetooth


a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

Protocol for Wireless Communication

-Uses radio waves to connect nodes
-Basically an Ethernet network that uses radio waves instead of wires
Each node requires a wireless network adapter: Transceivers


a proprietary open wireless protocol for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs).


-Anyone who unlawfully accesses a computer system
-Types of hackers:
Script kiddies

Virus Prevention

Anti-Virus Software, Firewalls must update so that new viruses do not infiltrate


Multiple tables related together


a single piece of information to be stored about an entity

Key Field

A field that contains a unique value for each value, that is used to I.D. an entity

Foreign Key

Key used to create relationships between the tables.


Multiple fields about one entity

Compound Table

A table with multiple keys and entity's

Process to create Database

Create proper structure and definitions, -What entities do you want to store information about, -What fields do you want to store about those entities, - I.D. the Key field, -Normalize, -Establish relationships between the tables


The process to structure tables in order to prevent data redundancy and inaccuracies

Data Types

Text, Number, Date, Time, Currency, Boolean (Yes/No, True/False)

Diff. Table Relations

1-1, 1-Many, Many-Many (if many-many occurs you create another table to make them 1-many)


Entity Relationship Diagram- illustrates the relationships between the tables.

Referential Integrity

A set of rules to maintain consistency between related tables


A question asked about data stored with in a database


Structured Query Language & Query By Example- QBE builds the SQL

Select Statement

A query/statement that: selects or extracts data

Update Statement

A query/statement that: updates data

Insert Statement

A query/statement that: inserts data

Delete Statement

A query/statement that: deletes data

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording