IBA - Sheet 1 Flashcards
“The Right to Be Forgotten”
An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?”
4G (fourth generation)
Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices.
A URL that gives the full path to a resource.
absolute URL
An open set of technologies for integrating components on the Internet and within Microsoft applications.
ActiveX
Ajax
A programming methodology that uses a number of existing technologies together and enables Web applications to make incremental updates to the user interface without the need to reload the browser page.
Software that scans disks and programs for known viruses and eliminates them.
anti-virus software
Small programs written in Java, which are downloaded as needed and executed within a Web page or browser.
applets
The appointment of a specific resource to a specific task.
assignment
A factor that is considered to be real or certain for planning purposes.
assumption
asymmetric encryption
An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.
attachment
A file that is sent with an e-mail message.
AU
Audio file format used by Unix servers, the majority of Web servers. Most Web browsers can read AU.
Audio Interchange File Format (AIFF)
High-quality audio format developed by Apple Computer.
Audio Video Interleave (AVI)
Standard Windows file format for video files.
authentication
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
backbone
The highest level in the computer network hierarchy, to which smaller networks typically connect.
bandwidth
The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
binary file
A file containing data or instructions written in zeros and ones (computer language).
blackhole list
A published list of IP addresses known to be sources of spam.
blog
Short for “Web log.” A collection of personal thoughts posted on a public Web site. Blogging is the act of adding entries to a blog.
Boolean operator
A symbol or word used in Internet searches to narrow search results by including or excluding certain words or phrases from the search criteria.
browser e-mail
E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.
call center
A centralized office used for the purpose of processing a large volume of requests by phone.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.
cascading style sheets (CSS)
Style sheet language that provides the formatting and “look” of a Web page or document written in a markup language.
change management
The process, tools and techniques that help people implement changes to achieve a desired outcome.
client
An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
cloud computing
Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.
codec
A compression/ decompression algorithm used by modern video and audio player plug-ins.
collective intelligence
The ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively compared to the intelligence of an individual member.
common field
A field contained in two or more database tables that forms a connection between the tables.
Common Gateway Interface (CGI)
A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.
constraint
A factor, such as budget or time, that limits a project manager’s options.
contact center
A call center that allows consumers to contact agents via avenues other than by telephone.
convergence
The integration of telephony and data technologies.
cookie
A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive.
crowdsourcing
A problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data.
database
A collection of data that can be sorted and searched using search algorithms.
database administrator
An individual who is responsible for the maintenance and security of an organization’s database resources and data.
database management system (DBMS)
A program used to store, access and manipulate database information.
dead link
A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server.
decryption
The process of converting encrypted data back to its original form.
deep URL
A URL that includes a path past the domain into the folder structure of a Web site.
digital certificate
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender’s public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.
digital signature
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
Digital Subscriber Line (DSL)
A high-speed direct Internet connection that uses all-digital networks.
disk cache
Storage space on a computer hard disk used to temporarily store downloaded data.
domain name
An IP address represented in words.
domain name server
A server that resolves domain names into IP addresses.
Domain Name System (DNS)
A system that maps uniquely hierarchical names to specific Internet addresses.
dynamic
Always changing.
e-mail client
An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages.
emoticon
A combination of characters that, when read sideways, helps convey emotion in an e-mail message.
Encapsulated PostScript (EPS)
File format used for importing and exporting graphics.
encryption
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
end-user license agreement (EULA)
A legal contract between the author of software and the end user that defines how the software can be used
event-driven
Reacting to particular user actions or the browser’s completion of a specific task.
extranet
A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.
The premier social networking site on the Web (www.facebook. com). It enables individuals to communicate individually and connect as groups using various communications tools.
field
A category of information in a database table.
File Transfer Protocol (FTP)
An Internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.
firewall
A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise’s internal network, which accesses the Internet indirectly through a proxy server.
folksonomy
The practice of categorizing online content through tags.
foreign key
A field in a related database table that refers to the primary key in the primary table.
fully qualified domain name (FQDN)
The complete domain name of an Internet computer, such as www.CIWcertified. com.
Gantt chart
A horizontal bar chart that graphically displays project tasks and durations.
gateway
A node on a network that serves as a portal to other networks.
geolocation
An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.
GNU Privacy Guard (GPG)
An open-source version of PGP, used for encrypting and decrypting e-mail messages, that does not use patented algorithms.
The de facto standard for search engine sites (www.google.com).
Graphics Interchange Format (GIF)
A graphical image file format commonly used in HTML documents.
greenfield
An approach in which a project lacks any constraints imposed by prior development.
hash
A number generated by an algorithm from a text string. Also known as a message digest.
hash encryption
An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption
header
A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.
header
An individual who diagnoses and resolves users’ technical hardware and software problems.
hexadecimal
A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system. In hexadecimal, the number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.
home page
The first Web page that displays when you access a domain.
host
A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
hypertext link
Highlighted or underlined text in a Web page that, when clicked, links the user to another location or Web page.
Hypertext Transfer Protocol (HTTP)
The protocol for transporting HTML documents across the Internet.
illicit server
An application that installs hidden services on systems. Illicit servers consist of “client” code and “server” code that enable the attacker to monitor and control the operation of the computer infected with the server code.
index
A catalog of the contents of a database. Each entry identifies a unique database record.
Information Technology (IT)
The management and processing of information using computers and computer networks.
instant messaging (IM)
A computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately.
Integrated Services Digital Network (ISDN)
A communication standard for sending voice, video or data over digital telephone lines.
interactive
The characteristic of some hardware and software, such as computers, games and multimedia systems, that allows them to respond differently based on a user’s actions.
Internet
A worldwide network of interconnected networks.
Internet Assigned Numbers Authority (IANA)
The international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN).
Internet Control Messaging Protocol (ICMP)
A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.
Internet Message Access Protocol (IMAP)
A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.
Internet Protocol (IP)
The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.
Internet Service Provider (ISP)
An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
intranet
An internal network based on TCP/IP protocols, accessible only to users within a company.
IP address
A unique numerical address assigned to a computer or device on a network.
Java
An object-oriented programming language developed by Sun Microsystems that is fully cross-platform functional.
Joint Photographic Experts Group (JPEG)
A graphical image file format commonly used for photographs.
junction table
A database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many relationship.
key
A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.
keyword
A word that appears on a Web page and is used by search engines to identify relevant URLs. Some words, such as “the” or “and,” are too common to be used as keywords.
list server
A server that collects and distributes information from an authorized group of participants, called a listserve group.
listserve group
Users who subscribe to an e-mailing list through a list server.
LiveScript
The Netscape-developed scripting language that was the predecessor to JavaScript.
local area network (LAN)
A group of computers connected within a confined geographic area.