IBA - Sheet 1 Flashcards

1
Q

“The Right to Be Forgotten”

A

An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4G (fourth generation)

A

Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A URL that gives the full path to a resource.

A

absolute URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An open set of technologies for integrating components on the Internet and within Microsoft applications.

A

ActiveX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ajax

A

A programming methodology that uses a number of existing technologies together and enables Web applications to make incremental updates to the user interface without the need to reload the browser page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that scans disks and programs for known viruses and eliminates them.

A

anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Small programs written in Java, which are downloaded as needed and executed within a Web page or browser.

A

applets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The appointment of a specific resource to a specific task.

A

assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A factor that is considered to be real or certain for planning purposes.

A

assumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric encryption

A

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attachment

A

A file that is sent with an e-mail message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AU

A

Audio file format used by Unix servers, the majority of Web servers. Most Web browsers can read AU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audio Interchange File Format (AIFF)

A

High-quality audio format developed by Apple Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Audio Video Interleave (AVI)

A

Standard Windows file format for video files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authentication

A

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

backbone

A

The highest level in the computer network hierarchy, to which smaller networks typically connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

bandwidth

A

The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

binary file

A

A file containing data or instructions written in zeros and ones (computer language).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

blackhole list

A

A published list of IP addresses known to be sources of spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

blog

A

Short for “Web log.” A collection of personal thoughts posted on a public Web site. Blogging is the act of adding entries to a blog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Boolean operator

A

A symbol or word used in Internet searches to narrow search results by including or excluding certain words or phrases from the search criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

browser e-mail

A

E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

call center

A

A centralized office used for the purpose of processing a large volume of requests by phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

A

A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

cascading style sheets (CSS)

A

Style sheet language that provides the formatting and “look” of a Web page or document written in a markup language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

change management

A

The process, tools and techniques that help people implement changes to achieve a desired outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

client

A

An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

cloud computing

A

Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

codec

A

A compression/ decompression algorithm used by modern video and audio player plug-ins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

collective intelligence

A

The ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively compared to the intelligence of an individual member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

common field

A

A field contained in two or more database tables that forms a connection between the tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Common Gateway Interface (CGI)

A

A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

constraint

A

A factor, such as budget or time, that limits a project manager’s options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

contact center

A

A call center that allows consumers to contact agents via avenues other than by telephone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

convergence

A

The integration of telephony and data technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

cookie

A

A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

crowdsourcing

A

A problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

database

A

A collection of data that can be sorted and searched using search algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

database administrator

A

An individual who is responsible for the maintenance and security of an organization’s database resources and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

database management system (DBMS)

A

A program used to store, access and manipulate database information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

dead link

A

A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

decryption

A

The process of converting encrypted data back to its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

deep URL

A

A URL that includes a path past the domain into the folder structure of a Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

digital certificate

A

A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender’s public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

digital signature

A

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Digital Subscriber Line (DSL)

A

A high-speed direct Internet connection that uses all-digital networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

disk cache

A

Storage space on a computer hard disk used to temporarily store downloaded data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

domain name

A

An IP address represented in words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

domain name server

A

A server that resolves domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Domain Name System (DNS)

A

A system that maps uniquely hierarchical names to specific Internet addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

dynamic

A

Always changing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

e-mail client

A

An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

emoticon

A

A combination of characters that, when read sideways, helps convey emotion in an e-mail message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Encapsulated PostScript (EPS)

A

File format used for importing and exporting graphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

encryption

A

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

end-user license agreement (EULA)

A

A legal contract between the author of software and the end user that defines how the software can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

event-driven

A

Reacting to particular user actions or the browser’s completion of a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

extranet

A

A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Facebook

A

The premier social networking site on the Web (www.facebook. com). It enables individuals to communicate individually and connect as groups using various communications tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

field

A

A category of information in a database table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

File Transfer Protocol (FTP)

A

An Internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

firewall

A

A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise’s internal network, which accesses the Internet indirectly through a proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

folksonomy

A

The practice of categorizing online content through tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

foreign key

A

A field in a related database table that refers to the primary key in the primary table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

fully qualified domain name (FQDN)

A

The complete domain name of an Internet computer, such as www.CIWcertified. com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Gantt chart

A

A horizontal bar chart that graphically displays project tasks and durations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

gateway

A

A node on a network that serves as a portal to other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

geolocation

A

An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

GNU Privacy Guard (GPG)

A

An open-source version of PGP, used for encrypting and decrypting e-mail messages, that does not use patented algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Google

A

The de facto standard for search engine sites (www.google.com).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Graphics Interchange Format (GIF)

A

A graphical image file format commonly used in HTML documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

greenfield

A

An approach in which a project lacks any constraints imposed by prior development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

hash

A

A number generated by an algorithm from a text string. Also known as a message digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

hash encryption

A

An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

header

A

A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

header

A

An individual who diagnoses and resolves users’ technical hardware and software problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

hexadecimal

A

A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system. In hexadecimal, the number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

home page

A

The first Web page that displays when you access a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

host

A

A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

hypertext link

A

Highlighted or underlined text in a Web page that, when clicked, links the user to another location or Web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Hypertext Transfer Protocol (HTTP)

A

The protocol for transporting HTML documents across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

illicit server

A

An application that installs hidden services on systems. Illicit servers consist of “client” code and “server” code that enable the attacker to monitor and control the operation of the computer infected with the server code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

index

A

A catalog of the contents of a database. Each entry identifies a unique database record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Information Technology (IT)

A

The management and processing of information using computers and computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

instant messaging (IM)

A

A computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Integrated Services Digital Network (ISDN)

A

A communication standard for sending voice, video or data over digital telephone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

interactive

A

The characteristic of some hardware and software, such as computers, games and multimedia systems, that allows them to respond differently based on a user’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Internet

A

A worldwide network of interconnected networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Internet Assigned Numbers Authority (IANA)

A

The international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Internet Control Messaging Protocol (ICMP)

A

A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Internet Message Access Protocol (IMAP)

A

A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Internet Protocol (IP)

A

The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Internet Service Provider (ISP)

A

An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

intranet

A

An internal network based on TCP/IP protocols, accessible only to users within a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

IP address

A

A unique numerical address assigned to a computer or device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Java

A

An object-oriented programming language developed by Sun Microsystems that is fully cross-platform functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Joint Photographic Experts Group (JPEG)

A

A graphical image file format commonly used for photographs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

junction table

A

A database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

key

A

A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

keyword

A

A word that appears on a Web page and is used by search engines to identify relevant URLs. Some words, such as “the” or “and,” are too common to be used as keywords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

list server

A

A server that collects and distributes information from an authorized group of participants, called a listserve group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

listserve group

A

Users who subscribe to an e-mailing list through a list server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

LiveScript

A

The Netscape-developed scripting language that was the predecessor to JavaScript.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

local area network (LAN)

A

A group of computers connected within a confined geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

lossless compression

A

A type of data file compression in which all original data can be recovered when thefile is decompressed.

106
Q

lossy compression

A

A type of data file compression in which some file information is permanently eliminated.

107
Q

Mail Delivery Agent (MDA)

A

An e-mail server program that receives sent messages and delivers them to their proper destination mailbox.

108
Q

Mail User Agent (MUA)

A

A messaging component used as a stand-alone application by the user.

109
Q

malware

A

Abbreviation for malicious software. Malware is software designed to harm computer systems.

110
Q

many-to-many relationship

A

In databases, a relationship in which one record in TableA can relate to many matching records in Table B, and vice versa.

111
Q

mashup

A

A Web page that integrates content and scripts from multiple Web sites to create new applications.

112
Q

Message Transfer Agent (MTA)

A

A messaging component that routes, delivers and receives e-mail.

113
Q

meta search engine

A

A search engine that scans Web pages for < meta > tag information.

114
Q

microformat

A

A data format that adds human-readable metadata to existing code so that the data can be processed by other software.

115
Q

milestone

A

The end of a stage that marks the completion of a task or series of related tasks, resulting in a key deliverable.

116
Q

mobile application developer

A

An individual who develops Web sites and/or applications for mobile devices.

117
Q

mobile computing

A

A person’s ability to use technology while “on the go.”

118
Q

mobile device repair technician

A

An individual who troubleshoots and repairs mobile device hardware components.

119
Q

modem

A

Abbreviation for modulator/ demodulator. An analog device that enables computers to communicate over telephone lines by translating digital data into audio/ analog signals (on the sending computer) and then back into digital form (on the receiving computer).

120
Q

Moving Picture Experts Group (MPEG)

A

High-quality audio and video file compression format.

121
Q

MPEG-1 Audio Layer-3 (MP3)

A

Popular compression standard for audio files; retains most of the sound quality of the source.

122
Q

Multipurpose Internet Mail Extensions (MIME)

A

A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.

123
Q

Musical Instrument Digital Interface (MIDI)

A

A standard computer interface for creating and playing electronic music. It allows computers to re-create music in digital format for playback.

124
Q

National Science Foundation (NSF)

A

An independent agency of the U.S. government that promotes the advancement of science and engineering.

125
Q

needs analysis

A

Determining a customer’s needs by acquiring information, processing and evaluating the information, then creating a plan of action to address the needs.

126
Q

network

A

A group of two or more computers connected so they can communicate with one another.

127
Q

network engineer

A

An individual who manages and maintains a network infrastructure.

128
Q

network interface card (NIC)

A

A circuit board within a computer’s central processing unit that serves as the interface enabling the computer to connect to a network.

129
Q

Network News Transfer Protocol (NNTP)

A

The Internet protocol used by news servers that enables the exchange of newsgroup (Usenet) articles.

130
Q

newsgroup

A

On Usenet, a subject or other topical interest group whose members exchange ideas and opinions. Participants post and receive messages via a news server.

131
Q

node

A

Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device attached to a network; a host.

132
Q

non-repudiation

A

The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.

133
Q

object

A

An element on a Web page that contains data and procedures for how that item will react when activated. On a Web page, an object is typically a multimedia presentation.

134
Q

object-oriented programming (OOP)

A

Programming concept based on objects and data and how they relate to one another, instead of logic and actions; C++ and Java are OOP languages.

135
Q

Ogg Vorbis (.ogg)

A

A free, open-source alternative to the MP3 compression format for audio files; creates smaller, faster downloading files.

136
Q

one-to-many relationship

A

In databases, a relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.

137
Q

one-to-one relationship

A

In databases, a relationship in which each record in Table A can have only one matching record in Table B, and vice versa.

138
Q

ontology

A

The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.

139
Q

open source

A

A peer-based development process describing organizations and products that provide free source code to the development community at large with the goal of developing better products; includes Apache Web server and Linux.

140
Q

open-source license

A

A “copyleft” license that removes restrictions on the use and distribution of the licensed product.

141
Q

P2P

A

A peer-to-peer network on the Internet.

142
Q

packet

A

Data processed by protocols so it can be sent across a network.

143
Q

patch

A

Programming code that provides a temporary solution to a known problem, or bug.

144
Q

patent

A

A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention.

145
Q

PC repair technician

A

An individual who installs, modifies and repairs personal computer (PC) hardware components.

146
Q

peer-to-peer network

A

A network in which each computer has both server and client capabilities.

147
Q

Personal Digital Assistant (PDA)

A

A small, handheld computer used for personal information management. The predecessor to the smartphone.

148
Q

personal information management (PIM) program

A

A tool used to schedule appointments and meetings, store contact information, and manage tasks.

149
Q

plug-in

A

A program installed in the browser to extend its basic functionality. Allows different file formats to be viewed as part of a standard HTML document.

150
Q

podcast

A

The use of audio or video digital-media files that are distributed through Web feeds to subscribed users.

151
Q

Point-to-Point Protocol (PPP)

A

A protocol that allows a computer to connect to the Internet over a phone line.

152
Q

Point-to-Point Protocol over Ethernet (PPPoE)

A

A protocol that implements PPP on top of the Ethernet architecture to connect an entire network to the Internet.

153
Q

pop-under window

A

A small browser window that appears behind the browser window you are viewing.

154
Q

pop-up window

A

A small browser window that appears in front of the browser window you are viewing.

155
Q

Portable Document Format (PDF)

A

A file format that can be transferred across platforms and retain its formatting; designated by the file name extension .pdf.

156
Q

Portable Network Graphics (PNG)

A

An open source graphical image file format created to replace GIFs.

157
Q

Post Office Protocol (POP)

A

A protocol that resides on an incoming mail server. The current version is POP3.

158
Q

presence

A

A status indicator that conveys a person’s willingness and ability to engage in communications.

159
Q

Pretty Good Privacy (PGP)

A

A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.

160
Q

primary key

A

A field containing a value that uniquely identifies each record in a database table.

161
Q

program management

A

The process of managing multiple interdependent projects to improve the performance of an organization.

162
Q

project

A

A sequence of tasks that must be accomplished within a certain time frame to achieve a desired result.

163
Q

project management

A

The practice of applying skills and processes to activities in order to meet deadlines and achieve desired results.

164
Q

project schedule

A

A document that lists the planned dates for performing tasks and meeting goals defined in a project plan.

165
Q

proprietary software

A

Software that is the legal property of an entity.

166
Q

query

A

A question posed by a user to a database to request database information. The database returns the query results based on the criteria supplied by the user in the query.

167
Q

QuickTime

A

A plug-in developed by Apple Computer for storing movie and audio files in digital format.

168
Q

QuickTime Movie (MOV)

A

Standard file format for Apple QuickTime; uses the .mov, .moov or .qt file name extension.

169
Q

record

A

A collection of information in a database table consisting of one or more related fields about a specific entity, such as a person, product or event.

170
Q

relational database

A

A database that contains multiple tables related through common fields.

171
Q

relationship

A

A connection between two or more database tables that is based on a field that the tables have in common.

172
Q

relative URL

A

A URL that gives an abbreviated path to a resource using the current page as a starting position.

173
Q

replication

A

The practice of copying data from one source, such as a database, to another.

174
Q

Request for Comments (RFC)

A

A document published by the IETF that details information about standardized Internet protocols and those in various development stages.

175
Q

resource

A

A person, department or device needed to accomplish a task.

176
Q

Return On Investment (ROI)

A

Profit earned as a result of a project relative to the value of resources required to complete it.

177
Q

Rich Text Format (RTF)

A

Portable text file format created by Microsoft that allows image insertion and text formatting; an almost universal format.

178
Q

root-level server

A

A server at the highest level of the Domain Name System.

179
Q

router

A

A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.

180
Q

scalable

A

The ability for a system to function well when its workload is increased or hardware is added to meet user need.

181
Q

scope

A

The goals and tasks of a project, and the work required to complete them.

182
Q

scope creep

A

Gradual increases in project scope that can undermine the success of a project.

183
Q

screen saver

A

A graphic or moving image that appears on your screen when your computer is idle.

184
Q

search engine

A

A powerful software program that searches Internet databases for user-specified information.

185
Q

search engine optimization (SEO)

A

The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing.

186
Q

Secure Copy (SCP)

A

A program used with Secure Shell (SSH) to transfer files between systems.

187
Q

Secure MIME (S/MIME)

A

Secure version of MIME that adds encryption to MIME data.

188
Q

Secure Sockets Layer (SSL)

A

A protocol that provides authentication and encryption, used by most servers for secure exchanges over the Internet. Superseded by Transport Layer Security (TLS).

189
Q

security analyst/consultant

A

An individual who examines an organization’s security requirements and determines the necessary infrastructure.

190
Q

security manager

A

An individual who manages the security measures used to protect electronic data.

191
Q

semantic Web

A

A Web 2.0 implementation by which Web data is contextualized with the addition of machine-readable metadata.

192
Q

SEO analyst

A

An individual who determines the visibility of Web sites across multiple clients and search engines.

193
Q

server

A

A computer in a network that manages the network resources and provides, or serves, information to clients.

194
Q

server administrator

A

An individual who manages and maintains network servers.

195
Q

shared domain

A

A hosting service that allows multiple entities to share portions of the same domain name.

196
Q

Simple Mail Transfer Protocol (SMTP)

A

The Internet standard protocol for transferring e-mail messages from one computer to another.

197
Q

smartphone

A

A mobile phone with advanced computing ability and Internet connectivity. Smartphones combine a mobile phone, camera, video recorder, global positioning system, touch screen, Web browser and wireless high-speed Internet connectivity into one device.

198
Q

snail mail

A

Slang term for the standard postal service.

199
Q

social networking

A

The practice of creating networks of friends, associates and clients who can discuss topics in common. Online social networking is a powerful concept used by individuals and businesses worldwide.

200
Q

spam

A

Unsolicited and unwanted e-mail messages; the online equivalent of junk mail.

201
Q

spam filter

A

An e-mail client program that identifies and filters out spam messages before they reach the e-mail Inbox.

202
Q

spim

A

Spam that is delivered through instant messaging.

203
Q

spyware

A

A software application secretly placed on a user’s system to gather information and relay it to outside parties, usually for advertising purposes.

204
Q

SSH File Transfer Protocol (S/FTP)

A

A file transfer protocol that allows the encryption of transmissions using the Secure Shell (SSH) protocol.

205
Q

SSL/TLS-enabled FTP (FTPS)

A

FTP that runs on an SSL/TLS-secured connection.

206
Q

stakeholder

A

A person or group with an interest in a project, and with the power to exert influence (either positive or negative) over the project and affect results.

207
Q

standard

A

A definition or format that has been approved by a recognized standards organization.

208
Q

Statement Of Work (SOW)

A

A contract to initiate a project; the contract contains project goals and specifies how those goals will be met.

209
Q

streaming media

A

A continuous flow of data, usually audio or video files, that assists with the uninterrupted delivery of those files into a browser.

210
Q

Structured Query Language (SQL)

A

A language used to create and maintain professional, high-performance corporate databases.

211
Q

symmetric encryption

A

An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption.

212
Q

table

A

A collection of data about a limited topic, organized into rows and columns in a database.

213
Q

tablet

A

A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.

214
Q

Tagged Image File Format (TIFF)

A

Commonly used graphic file format, developed by Aldus Corporation; uses the .tif or .tiff file name extension.

215
Q

task

A

A unit of work that must be accomplished during the course of a project.

216
Q

text messaging

A

A method of person-to-person communication in which users type short text messages from mobile phones.

217
Q

top-level domain

A

The group into which a domain is categorized, by common topic (company, educational institution) and/or geography (country, state).

218
Q

trackback

A

A method by which a blogger receives notification when other bloggers link to his or her blog entry.

219
Q

Transmission Control Protocol/Internet Protocol (TCP/IP)

A

A suite of protocols that turns data into blocks of information called packets, which are then sent across the Internet. The standard protocol used by the Internet.

220
Q

Transport Layer Security (TLS)

A

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

221
Q

trojan

A

A program disguised as a harmless application that actually produces harmful results.

222
Q

Twitter

A

A social networking and blogging site that allows individuals to communicate via short messages (www.twitter.com).

223
Q

typosquatting

A

The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.

224
Q

unified communications (UC)

A

A business trend that seeks to simplify and integrate all forms of communication. Also, a set of technologies that enable voice to be converted into text, and vice versa.

225
Q

Uniform Resource Identifier (URI)

A

A standardized method of referring to a resource using a text string.

226
Q

Uniform Resource Locator (URL)

A

A text string that specifies an Internet address and the method by which the address can be accessed.

227
Q

update

A

A file or collection of tools that resolves system liabilities and improves software performance.

228
Q

Usenet (User Network)

A

A collection of thousands of Internet computers, newsgroups and newsgroup members using Network News Transfer Protocol (NNTP) to exchange information.

229
Q

user name

A

A unique name or number that identifies you when logging on to a computer system or online service. In an e-mail address, the part before the @ symbol.

230
Q

vector graphics

A

Resizable images that are saved as a sequence of vector statements, which describes a series of points to be connected.

231
Q

viewer

A

A scaled-down version of an application; designed to view and print files.

232
Q

virtual domain

A

A hosting service that allows a company to host its domain name on a third-party ISP server.

233
Q

Virtual Network Computing (VNC)

A

A program that allows you to control a computer at a remote location.

234
Q

virus

A

A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.

235
Q

Visual Basic

A

The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language.

236
Q

Visual Basic Script (VBScript)

A

Scripting language from Microsoft derived from Visual Basic; used to manipulate ActiveX scripts.

237
Q

Voice over IP (VoIP)

A

A technology that converts voice into data packets for transmission over a packet-switched IP network. Allows the use of the Internet for real-time voice and video traffic.

238
Q

Waveform (WAV)

A

Windows standard format for audio files.

239
Q

Web 2.0

A

A concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities.

240
Q

Web application developer

A

An individual who develops primarily server-side Web applications.

241
Q

Web architect

A

An individual who creates the overview plan of a Web site’s development.

242
Q

Web browser

A

A software application that enables users to access and view Web pages on the Internet.

243
Q

Web feed

A

A data format for delivering Web content that is updated frequently.

244
Q

Web marketing manager

A

An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.

245
Q

Web page

A

An HTML document containing one or more elements (text, images, hyperlinks) that can be linked to or from other HTML pages.

246
Q

Web site

A

A World Wide Web server and its content; includes multiple Web pages.

247
Q

Web site analyst

A

An individual who analyzes Web site statistics to determine the site’s effectiveness.

248
Q

Web site designer

A

An individual who is responsible for the organization and appearance of a Web site.

249
Q

Web site manager

A

An individual who manages a Web development team.

250
Q

Web-based e-mail

A

Free e-mail service from a provider such as Windows Live Hotmail or Yahoo! in which you request a user name. You can access your e-mail from any computer that has access to the Internet.

251
Q

Webcast

A

An audio and/or video Web event that is distributed over the Internet.

252
Q

Webinar

A

An interactive Web-based seminar or training session.

253
Q

wide area network (WAN)

A

A group of computers connected over an expansive geographic area so their users can share files and services.

254
Q

wiki

A

A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and access to the Internet.

255
Q

wireless access point (AP)

A

A device that enables wireless systems to communicate with each other, provided that they are on the same network.

256
Q

wizard

A

A tool that assists users of an application in creating documents and/or databases based on styles and templates. Also a tool that guides users step-by-step through a software installation process.

257
Q

World Wide Web (WWW)

A

A set of software programs that enables users to access resources on the Internet via hypertext documents.

258
Q

worm

A

A self-replicating program or algorithm that consumes system resources.

259
Q

xDSL

A

Collectively, the variations of Digital Subscriber Line (DSL), which include ADSL, RADSL and HDSL.

260
Q

XMLHttpRequest

A

An application programming interface (API) that is used to transfer XML and other text data between a Web server and browser.

261
Q

Advanced Research Projects Agency (ARPA)A U.S. Department of Defense agency that created the first global computer network.

A

A U.S. Department of Defense agency that created the first global computer network.