chapter nine Flashcards

1
Q

1969

A

UCLA->ARPANET (Advanced Research Project Agency Network)

precursor to today’s internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

networks needed to be ___ and _____

A

robust

survivable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internet was the domain of scientists and academicians until…

A

standard programming language (HTML) was invented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTML (hypertext markup language)

A

facilitate the capability to move information through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

who invented HTML?

A

Tim Berners-Lee at CERN (Center of European Nuclear Research)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTP

A

hypertext transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

once HTML and HTTP were invented

A

the World Wide Web was born

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

client/server model

A

the internet’s type of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

server/host

A

a computer that stores webpages on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

client

A

the computer that requests webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“index.”

A

the homepage of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“html”

A

the document follows the language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

World Wide Web

A

the most dominant, dynamic resource on the planet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

internet protocol address

A

systems can be identified and can communicate through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

uniform resource locators (URLs)

A

web address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“http”

A

protocol/rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

“www”

A

world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

“yahoo.com”

A

domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

“.com”

A

top-level domain code/extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

website

A

a collection of web pages on a server that exists on the web that can be requested by a client and displayed by a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

websites are typically programmed with

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

hyperlink

A

a clickable navigation element
navigates to another webpage
can access the address and document name from another computer on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

webmaster/web developers

A

people that produce websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

aspects of a good website

A

content: MOST IMPORTANT
interactivity: engages, memorable, interesting
design: initial impression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
content managers
keep websites regularly updated and populated with relevant information
26
browser
application software that provides an interface that allows users to display and interact with text, images, and other information on the WWW
27
you don't visit a website..
the websites visits you, the client
28
bookmarks
"favorites", frequently visited websites
29
caching
when a browser stores copies of previously viewed web pages that the user has already accessed that allows it to find them quickly without having to make another request to the original server
30
cookies
text files used for tracking and maintaining specific information about users (preferences and contents)
31
graphic files (GIF and JPEG)
"joint photographic expert group" | "graphics interchange format"
32
javascript
client-side (user) programs that allow the browser to run small applications (clocks, calendars, etc.)
33
considerations when choosing a browser:
security popup blockers usability/ease of use
34
popups
separate browser windows that are programmed by website designers to open extra browser windows without user interaction
35
connectivity
one computer can connect to one or more computers and share information and resources
36
without connectivity..
internet and networks would not exist
37
to gain connectivity on the internet..
it is imperative to find a provider
38
internet service provider (ISP)
business that provides people with a way to access the internet
39
digital subscriber line (DSL)
"dial up"
40
broadband internet access
high data transmission rate internet connection cable modems and DSL typically faster dial-up modem
41
internet hosting services
serves content (like webpages) to the internet
42
web hosting
ISPs "rent" or host space to website owners and offer domain name registration
43
search engine
website that lets a user type in keywords, or phrases, and then returns a list of hits (hyperlinks) that best match
44
keyword search engines
only require keyword/phrase
45
directory searches
can only search within a particular area
46
metasearch engines
like keyword search engines, but search engines are pulled up instead of hyperlinks
47
electronic commerce
the distribution, buying, selling, advertising, and marketing of goods or services over the web
48
virtual storefront
selling on a website
49
business-to-business (B2B)
inclined to take place within specific categories
50
business-to-consumer (B2C)
ex: REI.com, overstock.com, buy.com
51
consumer-to-consumer (C2C)
typically facilitated by a third party
52
what is the most common form of C2C
auction websites | ex: eBay.com
53
a good business has
- capable management team - well-organized business structure - good customer service - inventory controls - clear business plan
54
other elements of a good e-commerce business
- market research - IT competencies - streamlined process - agility
55
browser hijacking
when the browser's settings are modified by malware
56
malware
designed to damage a computer's system without the owner's knowledge
57
viruses
malicious computer program that can copy itself and infect a computer (typically without the owner being aware) range of danger spread extremely fast (self-replicating)
58
worms
spreads quickly, self-replicating, extremely harmful, does not need to attach itself to an existing program typically harm NETWORKS
59
trojan horse
usually harmless, interesting looking program, that when executed unleashes harmful viruses insidious->released on time or event user may use program until released
60
spyware
software that installs itself without permission and gleans personal data about the users
61
what does spyware usually steal?
credit card numbers, social security numbers, passwords
62
adware
software that routinely displays advertising to a computer system after software is installed without consent
63
what is the most common use of the internet?
communication
64
e-mail
a "store and forward" system of composing, sending, storing, and receiving messages over electronic systems like the internet
65
email address
user's name, domain code, domain name
66
subject
below address, consists of one line description of the nature of the email
67
file attachment
computer files added
68
header
the email address, subject, and attachment
69
body
the actual message
70
carbon copy (CC)
copy more than one recipient
71
blind carbon copy (BCC)
works like CC, but none of the recipients know who else received the email
72
email lists
help facilitate emailing by storing common email contacts
73
all email should be considered _______
public
74
most email servers are owned by ____ _____
private entities | ultimately they own the messages
75
terms of service agreement (TOS)
outlines email usage and protocols
76
phishing
email that looks like a legitimate bank, when in reality it is a ruse to attempt to fool users into voluntarily typing their social security numbers, bank passwords, and pin numbers
77
spam
all unwanted mail | slows down computer systems
78
what happens when you hit the remove link on a spam email?
it verifies that the spam made it to a legitimate email address and will likely receive even more
79
voice over internet protocol (VOiP)
the routing of voice conversations or phone calls over the internet (subset of telephony) ex: skype, CISCO
80
intranet
private version of the internet, confined within an organization
81
what is a key aspect of the intranet?
PRIVACY | can reduce costs
82
firewall
specialized hardware and software working together to ensue that only authorized personnel within an organization can use the intranet
83
how can an intranet reduce costs?
reduce printing, distribution, and time
84
internet-enabled sensors have raised concerns
privacy | bricking (updates with no regard for consumers)