Final Review Flashcards
What are cookies, and what are they used for?
(technically an HTTP cookie) is a small chunk of data generated by a Web server and stored in a text file on your computer’s hard disk.they allow a website to store information on a client computer for later retrieval
Web sites use cookies to?
- monitor your path through a site to keep track of the pages you viewed or the items you purchased
- gather info that allows a web server to present ad banners targeted to products you previously purchased at that site
- collect personal info you submit to a web page, and retain it for you the next time you visit the site.
What does an Antispyware program do?
it identifies and neutralizes web bugs, ad-serving cookies, and other spyware
What is a web crawler?
(web spider) is a computer program that is automated to methodically visit web sites. download web pages and submit then to an indexing utility for processing
What is netiquette?
is online jargon for internet etiquette. keeps you civilized.
Buffer?
is technical jargon for a region of memory that holds data waiting to be transferred from one device to another
What are different forms of e-commerce?
B2BC2CB2C*B2G
What provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?
Multitasking.
What allows multiple parts, or threads to run simultaneously. For example, one thread for spreadsheet program might be waiting for input from the user while other threads perform calculations in the background.
Multithreading
An operating systems ________ capability supports a division of labor among all the processing units
Multiprocessing.
The rate at which data is transmitted from your home computer to the Internet
Upstream speed
The rate at which transmitted data flows from a host or server to a local computer
Downstream speed
Technique for increasing the speed of a computer component, such as a processor, graphics card, system board, or memory
Overclocking
A word number or phrase that must be known to encrypt or decrypt a message?
Cryptographic key
An interconnected group of computers and peripherals located within a relatively limited area, such as a building or campus
LAN (local area network)
Interconnected group of computers & peripherals that covers a large geographical area, such as multiple branches of a corporation.
WAN (wireless area network)
Payment between buyer and seller
P2P (person to person)
Exchange of information and products and services between businesses
B2B (business to business)
Encrypts data you transmit keeping passwords and account numbers safe from hackers
VPN (virtual private network)
The main processing circuitry within a computer chip that contains the ALU, control unit, and registers
CPU (central processing unit)
An e commerce exchange of products between businesses and consumers
B2C (business to consumer)
Exchange of products between consumers. For example online auctioning
C2C (consumer to consumer )
Exchange of product between businesses and the government
B2G (business to government)
Ethernet compatible wireless connection that’s uses 802.11a,b,g and n standards
Wifi
A fixed wireless internet service based on Ethernet protocols with a range of 30 miles and a transmission speed of 70mbps
WiMAX
A file format that provides highly compressed audio files with very little loss of sound quality
MP3
Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on
RAM (random access memory)
One of the main protocols of TCP/IP responsible for addressing packets so that they can be routed to their destinations
IP (Internet protocol)
Computers that are connected to each other to share data
Network
Programs that enable users to perform specific tasks on a computer such as writing a letter or playing a game
Application software
Help the computer system monitor itself in order to function efficiently
System software.
A collection of data that is stored on personal computers ( can contain any source of data )
database
Helps organize your computer based files
File management
Types of DRM technologies?
Watermarks, authentication, proprietary media formats, encryption
What is a bridge?
It connects two similar networks!
The process of preparing a data storage device such as a hard disk drive.
Hard disk formatting
Network devices
- routers
- HUBS
- switches
- gateways
- bridges
- wireless access points
- repeaters