IBA - Sheet 1 Flashcards
“The Right to Be Forgotten”
An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?”
4G (fourth generation)
Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices.
A URL that gives the full path to a resource.
absolute URL
An open set of technologies for integrating components on the Internet and within Microsoft applications.
ActiveX
Ajax
A programming methodology that uses a number of existing technologies together and enables Web applications to make incremental updates to the user interface without the need to reload the browser page.
Software that scans disks and programs for known viruses and eliminates them.
anti-virus software
Small programs written in Java, which are downloaded as needed and executed within a Web page or browser.
applets
The appointment of a specific resource to a specific task.
assignment
A factor that is considered to be real or certain for planning purposes.
assumption
asymmetric encryption
An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.
attachment
A file that is sent with an e-mail message.
AU
Audio file format used by Unix servers, the majority of Web servers. Most Web browsers can read AU.
Audio Interchange File Format (AIFF)
High-quality audio format developed by Apple Computer.
Audio Video Interleave (AVI)
Standard Windows file format for video files.
authentication
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
backbone
The highest level in the computer network hierarchy, to which smaller networks typically connect.
bandwidth
The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
binary file
A file containing data or instructions written in zeros and ones (computer language).
blackhole list
A published list of IP addresses known to be sources of spam.
blog
Short for “Web log.” A collection of personal thoughts posted on a public Web site. Blogging is the act of adding entries to a blog.
Boolean operator
A symbol or word used in Internet searches to narrow search results by including or excluding certain words or phrases from the search criteria.
browser e-mail
E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.
call center
A centralized office used for the purpose of processing a large volume of requests by phone.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.