Upgrade to remove ads
Mr. Overstreet BTA Web Terms
Terms in this set (59)
A system of logic based on operators such as AND, OR, and NOT. In many search engines, search terms are linked with these Boolean operators to create more precise queries.
A common reference to communications or Web access that's faster than dial-up (56k). Broadband access includes cable modems and digital subscriber lines (DSL).
The computer program used to view documents on the World Wide Web (for example, Netscape Navigator or Microsoft's Internet Explorer).
Real-time Internet conferencing between two or more users. Chatting is usually accomplished by typing on the keyboard, not speaking, and each message is sent directly to the recipient.
A virtual room where a chat session takes place. Technically, a chat room is really a channel, but the term "room" is used to promote the chat metaphor.
Refers to the Internet or to the online world in general.
A collection of information organized in such a way that users—often both people and computer programs—can quickly select desired pieces of data.
Digital Subscriber Line (DSL)
class of technologies that use copper phone lines to establish high-speed Internet connections to homes and businesses.
The act of copying data, usually an entire file, from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service to one's own computer.
Short for "electronic mail," e-mail is the transmission of messages over networks.
Any procedure used in cryptography to convert plain text into cyphertext to prevent anyone but the intended recipient from reading it.
Filter (or filtering)
A type of technology that allows Internet material or activities deemed inappropriate to be blocked so that someone using the filtered computer can't access the material or participate in the activities.
The list, which most Web browsers maintain of downloaded pages in a session, that allows users to quickly review everything that's been retrieved. History files can easily be cleared or altered.
Instant Message (IM):
A two-way, real-time, private dialogue between two users.
A decentralized global communications network connecting millions of individual users.
Internet Service Provider (ISP)
An organization or company that provides access to the Internet. Examples of national-level ISPs include America Online (AOL), EarthLink, and Microsoft Network (MSN).
The time that a user isn't connected to the Internet.
A communications network that allows all computers in the network to act as servers and share their files with all other users on the network. Napster is one example of peer-to-peer networking on the Internet. Also known as P2P.
The time that a user is connected to the Internet.
A device that can copy text or illustrations printed on paper and translate the information into a form that can be used on a computer.
A program that searches documents or indexes of documents for specified words or phrases.
Unsolicited e-mail in general, but particularly unsolicited e-mail of a commercial nature.
refers to a technique for transferring data so that it can be processed as a steady and continuous stream (as distinct from the user's needing to download the entire file before being able to watch or listen to it).
Surfing (or Web surfing):
s a metaphor for browsing the contents of the Web.
Uniform Resource Locator (URL)
The address of documents and other resources on the World Wide Web.
a type of replicating computer program that travels from computer to computer, most often through network connections that deliver e-mails or attached files. Computer viruses often spread without a user's knowledge and may or may not cause disruption, lost or erased files, or other computer-data damage to the infected computer.
A video camera that is used to transmit periodic images or continuous video to a Web site for display.
A computer connected to a network (often the Internet).
World Wide Web (WWW)
refers to the set of information resources that can be accessed via HTTP.
he capacity of an electronic line, such as a communications network or computer channel, to transmit bits per second (bps).
A blog is information that is instantly published to a Web site. Blog scripting allows someone to automatically post information to a Web site. The information first goes to a blogger Web site and then the information is automatically inserted into a template tailored for your Web site.
a way of storing your favorite sites on the Internet. Browsers like Netscape or Internet Explorer allow you to categorize your bookmarks into folders.
A method of identifying computer addresses. Your e-mail address has a domain address. If you have an "edu" at the end of your e-mail address that means your account is affiliated with an educational institution. A "com" extension means you have a business account. A government account has a .gov suffix.
A computer "firewall" is a barrier between your computer and the outside world. Your computer is most vulnerable at its ports (the doors). Without ports you could not go on the Internet or let Internet traffic enter your computer.
Generally the first page retrieved when accessing a Web site. Usually a "home" page acts as the starting point for a user to access information on the site. The "home" page usually has some type of table of contents for site information or other materials. When creating Web pages, the "home" page has the filename "index.html," which is the default name. The "index" page automatically opens up as the "home" page.
A destructive computer program that replicates itself throughout your computer's hard drive and and memory. Worms use up the computers resources and pull the system down. Worms can be spread in mass-e-mailing if the user opens an attachment.
A spoofing attack
is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
is a piece of software which appears to perform a certain action but in fact performs another. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be acutely malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs.
is someone specializing in the discovery of exploits in systems to obtain unauthorized access to systems through skills, tactics and detailed knowledge. In the most common general form of this usage, "hacker" refers to a black-hat hacker (a malicious or criminal hacker).
is a collection of techniques used to manipulate people into performing actions or divulging confidential information. Typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim.
is a file that is sent along with an email message. The file can be of any type (for example a spread sheet, a word processor document, an image, or an mp3).
Bcc (blind carbon copy)
is a copy of an email message sent to a recipient whose email address does not appear in the message. This is in contrast to To and Cc recipients, whose addresses do appear in the respective header lines. Every recipient of the message can see the To and Cc recipients, but not the Bcc recipients.
used to reach someone via email. The format of an email address is user@domain. For example, my email address is firstname.lastname@example.org where "email.guide" is the user name and "about.com" is the domain
Sending an e-mail that, when the recipient opens the message or clicks on the attachment, unleashes a virus that infiltrates and "spoofs" the recipient's e-mail address, allowing a
spammer to actually use that computer to send more spam.
Fraudulent solicitation for account information, such as credit-card numbers and passwords by impersonating the domain and e-mail content of a company to which users have entrusted the storage of these data. The e-mail message will direct the recipient to a Website resembling that of the legitimate company; the site will include a form for the recipient to input his personal information, which the scammer can use for identity fraud.
Window in an e-mail client that allows the user to view the beginning of a message without actually clicking on the e-mail to open it.
A database object used to collect and store data relating to a particular subject or topic.
Use forms to enter or edit the information in your tables. A database object used for displaying table data one record at a time.
Use reports to deliver a professional presentation or written report.
. Filter data so that you retrieve selected records or fields from the database.
Automate tasks that you perform on a regular basis in a database.
Automate a group of related procedures in Access.
The view used for defining the fields of a table.
A table displayed as rows and columns of data where each row represents a record and each column represents a field.
A single item, or column of information in a record.
A set of data about one item. An individual entry or row in a table containing one or more fields.
A database in which data is separated into tables of related records. In Access, a database includes a collection of objects-tables, queries, reports, forms, and other objects.
A field whose values uniquely identifies each record in a table. The primary key provides the default sort order for a table and is used to establish connections to and relationships with other tables.
YOU MIGHT ALSO LIKE...
CIS 2201 ch. 1 Discovering Computers UNG…
computer Concepts final exam
Computer Science Final