78 terms

CIS Exam 3

"Center for european Nuclear Research" - where Tim Berners-lee invented a standard programming language
Typically called "index"
Uniform Reasearch Locaters (URL)
the address of a website and have components that make it up
Browser Application Software
What displays the website
Design (132)
A good design of a website can be a customer's initial impression of a business
also call "favorites"; will catalog your favorite URL's that the user has visited or plans to visit, so the user doesn't have to remember the page URL.
Text files sent to a browser and then sent back unchanged by the browser to the originating server. Used for tracking and maintaining specific information.
Java Script
client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page
Popup blockers
settings to disallow popups
ease of use of a browser
high data-transmission rate internet connection
Directory Searches
a search engines organized into directories like medicine or automotive so the user can search only within a particular area
Rules of Business
need a very capable management team, a well-organized business structure, good customer service, inventory controls, and much more
IT Competencies
e-commerce websites need to provide an easy, secure way to handle transactions while remaining attractive and very easy to use and navigate.
Cc (Carbon Copy)
option in emailing that offers the ability to copy more than one recipient and lets all of the recipients know who else has received the same email.
BCC (Blind Carbon Copy)
distribution option works like the carbon copy except none of the recipients know who else received the same email, or whether anyone other than them received it at all
TOS (terms of service agreement)
email server owners rules that specifically outlines email usage and protocols. Don't say or type anything in an email that you wouldn't be willing to say in public.
encompasses the general use of equipment to provide voice communication over distances, specifically by connecting telephones to each other
Tim Berners-Lee
invented a standard programming language called HTML and the protocol to move information through the internet called HTTP
the ability to link various media and devices, thereby enhancing communication and improving access to information
Risk Management
the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them.
someone who attempts to evade or disable a computer's security measures, and then steals computer resources at their leisure
Unsecure Computer
extremely easy to breach, especially by a seasoned hacker
Purchase Scams
The most uncomplicated type of internet fraud. Involve a buyer typically in another country that approaches merchants via spam and asks if they can pay for shipping with a credit card. Once the order is shipped, the credit card is cancelled and the shipping company receives a charge back and loses all of their money from the other.
Tracking Cookie
a copy of a webpage was sent from the book seller's server to your computer(client). the server also sent a small text file called a cookie that the user is typically unaware of
Data Mining
when experts extract useful data and information from recorded data like a cookie.
History Files
a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the web.
a client-server model
Arpanet (advanced Research Project Agency Network)
One of the precursors to today's internet
HTML (Hypertext Markup Language)
standard programming language
Web browser
application software that provides an interface which lets a user display and interact with text, images, and other information located on the WWW.
the protocol to move information through the internet
The largest network
the internet
Client/Server Model
that the internet network is called; a computer on a network that stores web pages is called the server or host. The computer on the network that requests those Web pages is called a client. A computer can be both a client and a server at the same time
IP Address (Internet Protocol)
One of the two core internet standards. IP defines the standard that describes how an internet-connected computer should break data down into packets for transmission across the network. In other words an address system to identify and communicate throughout the network.
Domain name
Webmaster/web developer
People that produce a website
when the browser stores copies on a user's computer of previously viewed web pages that a user has already accessed so it does not have to find it again on the WWW
Graphic files (GIF and JPEG)
how web browsers display images
client-side (user) programs that allow the browser to run small applications, like clocks and calendars that show up on a web page.
Client side program
programs that enable users to access a certain type of data
ISP (internet Service Provider)
a business or organization that provides people a way to access the internet and WWW.
Search engine
website that lets a user type in specific keywords then returns list of hyperlinks
Metasearch engines
look and work like keyword searches, but return results of many search engines at once an eliminate duplicate hits
distributing, buying, selling, advertising, and marketing of goods or services over the web.
E-commerce to other businesses; inclines to take place within specific categories
where commercial organizations sell to consumers
involves e-commerce between consumers, usually facilitated by some third party
Rules of Business
need a very capable management team, a well organized business structure, good customer service, inventory controls, and much more
Market Research
Research any business needs to ask for success
Streamline Business Process
How you do business on the web
allows for website reengineering, and even an entire business facelift far faster than conventional businesses
Browser Hijacking
When the browser's settings are modified by Malware
software designed to damage a computer's system without the owner's knowledge
like a virus in that is spreads quickly and is extremely harmful, but does not need to attach itself to an existing program. They are self-replicating, they harm networks
Trojan Horse
is usually a harmless or interesting looking program that when executed, unleashes harmful viruses into a user's system
software which routinely displays advertising to a computer system after the software is installed, usually without the user's consent
malicious computer program that can copy itself and infect a computer, typically without the user being aware of it
Elements of an email
Subject, attachment, header
Email Security
Watch out for stuff like phishing
any unwanted mail like phishing; emails can range from simple advertising to phishing schemes
VoIP (Voice over internet Protocol)
the routing of voice conversations, or typically phone calls over the internet
like a private version of the internet that works the same way as the internet but is confined within an organization
specialized hardware and software working together that insures that only authorized personnel within an organization can use the internet
Most important part of a website
Second most important part of a website
most important part of the INTERNET
Risk Management
the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them.
DoS Attack
(Denial of Service attack); most harmful, an attempt to make a computer or any of its resources unavailable to its intended users
Reverse Phishing/Keylogging
a relatively new form of malware, key logging is when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard
System Patches
operating system protecting their user's operating systems by automatically offering online updates that have been identified as security threats in the operating system itself
Internet Fraud
any fraudulent activity on the internet (credit card theft)
Anonymous and Anonymity
one's personal identity is not known, You are really participating in your own loss of privacy when you use the internet
Dumpster Diving
Criminals look through trash to get your information
Be "STINGY" about giving out personal information. "CHECK" your financial information on a regular basis and look what should and shouldn't be there. "ASK" periodically for your credit report. "MAINTAIN" careful records of your banking and financial records.
Identity Theft
a crime concerning the unlawful practice of assuming another individual's identity, and it is one of the fastest growing crimes in the US and Canada.
large database online
facebook is worth billions of dollars because it has a...
Head Elements
typically define a web document's title, style, and <META> tags.