IBA - Sheet 1 Flashcards

1
Q

“The Right to Be Forgotten”

A

An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4G (fourth generation)

A

Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A URL that gives the full path to a resource.

A

absolute URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An open set of technologies for integrating components on the Internet and within Microsoft applications.

A

ActiveX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ajax

A

A programming methodology that uses a number of existing technologies together and enables Web applications to make incremental updates to the user interface without the need to reload the browser page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that scans disks and programs for known viruses and eliminates them.

A

anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Small programs written in Java, which are downloaded as needed and executed within a Web page or browser.

A

applets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The appointment of a specific resource to a specific task.

A

assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A factor that is considered to be real or certain for planning purposes.

A

assumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric encryption

A

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attachment

A

A file that is sent with an e-mail message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AU

A

Audio file format used by Unix servers, the majority of Web servers. Most Web browsers can read AU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audio Interchange File Format (AIFF)

A

High-quality audio format developed by Apple Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Audio Video Interleave (AVI)

A

Standard Windows file format for video files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authentication

A

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

backbone

A

The highest level in the computer network hierarchy, to which smaller networks typically connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

bandwidth

A

The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

binary file

A

A file containing data or instructions written in zeros and ones (computer language).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

blackhole list

A

A published list of IP addresses known to be sources of spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

blog

A

Short for “Web log.” A collection of personal thoughts posted on a public Web site. Blogging is the act of adding entries to a blog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Boolean operator

A

A symbol or word used in Internet searches to narrow search results by including or excluding certain words or phrases from the search criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

browser e-mail

A

E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

call center

A

A centralized office used for the purpose of processing a large volume of requests by phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

A

A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
cascading style sheets (CSS)
Style sheet language that provides the formatting and "look" of a Web page or document written in a markup language.
26
change management
The process, tools and techniques that help people implement changes to achieve a desired outcome.
27
client
An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
28
cloud computing
Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.
29
codec
A compression/ decompression algorithm used by modern video and audio player plug-ins.
30
collective intelligence
The ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively compared to the intelligence of an individual member.
31
common field
A field contained in two or more database tables that forms a connection between the tables.
32
Common Gateway Interface (CGI)
A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.
33
constraint
A factor, such as budget or time, that limits a project manager's options.
34
contact center
A call center that allows consumers to contact agents via avenues other than by telephone.
35
convergence
The integration of telephony and data technologies.
36
cookie
A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive.
37
crowdsourcing
A problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data.
38
database
A collection of data that can be sorted and searched using search algorithms.
39
database administrator
An individual who is responsible for the maintenance and security of an organization's database resources and data.
40
database management system (DBMS)
A program used to store, access and manipulate database information.
41
dead link
A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server.
42
decryption
The process of converting encrypted data back to its original form.
43
deep URL
A URL that includes a path past the domain into the folder structure of a Web site.
44
digital certificate
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.
45
digital signature
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
46
Digital Subscriber Line (DSL)
A high-speed direct Internet connection that uses all-digital networks.
47
disk cache
Storage space on a computer hard disk used to temporarily store downloaded data.
48
domain name
An IP address represented in words.
49
domain name server
A server that resolves domain names into IP addresses.
50
Domain Name System (DNS)
A system that maps uniquely hierarchical names to specific Internet addresses.
51
dynamic
Always changing.
52
e-mail client
An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages.
53
emoticon
A combination of characters that, when read sideways, helps convey emotion in an e-mail message.
54
Encapsulated PostScript (EPS)
File format used for importing and exporting graphics.
55
encryption
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
56
end-user license agreement (EULA)
A legal contract between the author of software and the end user that defines how the software can be used
57
event-driven
Reacting to particular user actions or the browser's completion of a specific task.
58
extranet
A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.
59
Facebook
The premier social networking site on the Web (www.facebook. com). It enables individuals to communicate individually and connect as groups using various communications tools.
60
field
A category of information in a database table.
61
File Transfer Protocol (FTP)
An Internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.
62
firewall
A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server.
63
folksonomy
The practice of categorizing online content through tags.
64
foreign key
A field in a related database table that refers to the primary key in the primary table.
65
fully qualified domain name (FQDN)
The complete domain name of an Internet computer, such as www.CIWcertified. com.
66
Gantt chart
A horizontal bar chart that graphically displays project tasks and durations.
67
gateway
A node on a network that serves as a portal to other networks.
68
geolocation
An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.
69
GNU Privacy Guard (GPG)
An open-source version of PGP, used for encrypting and decrypting e-mail messages, that does not use patented algorithms.
70
Google
The de facto standard for search engine sites (www.google.com).
71
Graphics Interchange Format (GIF)
A graphical image file format commonly used in HTML documents.
72
greenfield
An approach in which a project lacks any constraints imposed by prior development.
73
hash
A number generated by an algorithm from a text string. Also known as a message digest.
74
hash encryption
An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption
75
header
A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.
76
header
An individual who diagnoses and resolves users' technical hardware and software problems.
77
hexadecimal
A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system. In hexadecimal, the number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.
78
home page
The first Web page that displays when you access a domain.
79
host
A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
80
hypertext link
Highlighted or underlined text in a Web page that, when clicked, links the user to another location or Web page.
81
Hypertext Transfer Protocol (HTTP)
The protocol for transporting HTML documents across the Internet.
82
illicit server
An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.
83
index
A catalog of the contents of a database. Each entry identifies a unique database record.
84
Information Technology (IT)
The management and processing of information using computers and computer networks.
85
instant messaging (IM)
A computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately.
86
Integrated Services Digital Network (ISDN)
A communication standard for sending voice, video or data over digital telephone lines.
87
interactive
The characteristic of some hardware and software, such as computers, games and multimedia systems, that allows them to respond differently based on a user's actions.
88
Internet
A worldwide network of interconnected networks.
89
Internet Assigned Numbers Authority (IANA)
The international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN).
90
Internet Control Messaging Protocol (ICMP)
A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.
91
Internet Message Access Protocol (IMAP)
A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.
92
Internet Protocol (IP)
The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.
93
Internet Service Provider (ISP)
An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
94
intranet
An internal network based on TCP/IP protocols, accessible only to users within a company.
95
IP address
A unique numerical address assigned to a computer or device on a network.
96
Java
An object-oriented programming language developed by Sun Microsystems that is fully cross-platform functional.
97
Joint Photographic Experts Group (JPEG)
A graphical image file format commonly used for photographs.
98
junction table
A database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many relationship.
99
key
A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.
100
keyword
A word that appears on a Web page and is used by search engines to identify relevant URLs. Some words, such as "the" or "and," are too common to be used as keywords.
101
list server
A server that collects and distributes information from an authorized group of participants, called a listserve group.
102
listserve group
Users who subscribe to an e-mailing list through a list server.
103
LiveScript
The Netscape-developed scripting language that was the predecessor to JavaScript.
104
local area network (LAN)
A group of computers connected within a confined geographic area.
105
lossless compression
A type of data file compression in which all original data can be recovered when the file is decompressed.
106
lossy compression
A type of data file compression in which some file information is permanently eliminated.
107
Mail Delivery Agent (MDA)
An e-mail server program that receives sent messages and delivers them to their proper destination mailbox.
108
Mail User Agent (MUA)
A messaging component used as a stand-alone application by the user.
109
malware
Abbreviation for malicious software. Malware is software designed to harm computer systems.
110
many-to-many relationship
In databases, a relationship in which one record in Table A can relate to many matching records in Table B, and vice versa.
111
mashup
A Web page that integrates content and scripts from multiple Web sites to create new applications.
112
Message Transfer Agent (MTA)
A messaging component that routes, delivers and receives e-mail.
113
meta search engine
A search engine that scans Web pages for < meta > tag information.
114
microformat
A data format that adds human-readable metadata to existing code so that the data can be processed by other software.
115
milestone
The end of a stage that marks the completion of a task or series of related tasks, resulting in a key deliverable.
116
mobile application developer
An individual who develops Web sites and/or applications for mobile devices.
117
mobile computing
A person's ability to use technology while "on the go."
118
mobile device repair technician
An individual who troubleshoots and repairs mobile device hardware components.
119
modem
Abbreviation for modulator/ demodulator. An analog device that enables computers to communicate over telephone lines by translating digital data into audio/ analog signals (on the sending computer) and then back into digital form (on the receiving computer).
120
Moving Picture Experts Group (MPEG)
High-quality audio and video file compression format.
121
MPEG-1 Audio Layer-3 (MP3)
Popular compression standard for audio files; retains most of the sound quality of the source.
122
Multipurpose Internet Mail Extensions (MIME)
A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.
123
Musical Instrument Digital Interface (MIDI)
A standard computer interface for creating and playing electronic music. It allows computers to re-create music in digital format for playback.
124
National Science Foundation (NSF)
An independent agency of the U.S. government that promotes the advancement of science and engineering.
125
needs analysis
Determining a customer's needs by acquiring information, processing and evaluating the information, then creating a plan of action to address the needs.
126
network
A group of two or more computers connected so they can communicate with one another.
127
network engineer
An individual who manages and maintains a network infrastructure.
128
network interface card (NIC)
A circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
129
Network News Transfer Protocol (NNTP)
The Internet protocol used by news servers that enables the exchange of newsgroup (Usenet) articles.
130
newsgroup
On Usenet, a subject or other topical interest group whose members exchange ideas and opinions. Participants post and receive messages via a news server.
131
node
Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device attached to a network; a host.
132
non-repudiation
The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
133
object
An element on a Web page that contains data and procedures for how that item will react when activated. On a Web page, an object is typically a multimedia presentation.
134
object-oriented programming (OOP)
Programming concept based on objects and data and how they relate to one another, instead of logic and actions; C++ and Java are OOP languages.
135
Ogg Vorbis (.ogg)
A free, open-source alternative to the MP3 compression format for audio files; creates smaller, faster downloading files.
136
one-to-many relationship
In databases, a relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.
137
one-to-one relationship
In databases, a relationship in which each record in Table A can have only one matching record in Table B, and vice versa.
138
ontology
The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.
139
open source
A peer-based development process describing organizations and products that provide free source code to the development community at large with the goal of developing better products; includes Apache Web server and Linux.
140
open-source license
A "copyleft" license that removes restrictions on the use and distribution of the licensed product.
141
P2P
A peer-to-peer network on the Internet.
142
packet
Data processed by protocols so it can be sent across a network.
143
patch
Programming code that provides a temporary solution to a known problem, or bug.
144
patent
A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention.
145
PC repair technician
An individual who installs, modifies and repairs personal computer (PC) hardware components.
146
peer-to-peer network
A network in which each computer has both server and client capabilities.
147
Personal Digital Assistant (PDA)
A small, handheld computer used for personal information management. The predecessor to the smartphone.
148
personal information management (PIM) program
A tool used to schedule appointments and meetings, store contact information, and manage tasks.
149
plug-in
A program installed in the browser to extend its basic functionality. Allows different file formats to be viewed as part of a standard HTML document.
150
podcast
The use of audio or video digital-media files that are distributed through Web feeds to subscribed users.
151
Point-to-Point Protocol (PPP)
A protocol that allows a computer to connect to the Internet over a phone line.
152
Point-to-Point Protocol over Ethernet (PPPoE)
A protocol that implements PPP on top of the Ethernet architecture to connect an entire network to the Internet.
153
pop-under window
A small browser window that appears behind the browser window you are viewing.
154
pop-up window
A small browser window that appears in front of the browser window you are viewing.
155
Portable Document Format (PDF)
A file format that can be transferred across platforms and retain its formatting; designated by the file name extension .pdf.
156
Portable Network Graphics (PNG)
An open source graphical image file format created to replace GIFs.
157
Post Office Protocol (POP)
A protocol that resides on an incoming mail server. The current version is POP3.
158
presence
A status indicator that conveys a person's willingness and ability to engage in communications.
159
Pretty Good Privacy (PGP)
A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.
160
primary key
A field containing a value that uniquely identifies each record in a database table.
161
program management
The process of managing multiple interdependent projects to improve the performance of an organization.
162
project
A sequence of tasks that must be accomplished within a certain time frame to achieve a desired result.
163
project management
The practice of applying skills and processes to activities in order to meet deadlines and achieve desired results.
164
project schedule
A document that lists the planned dates for performing tasks and meeting goals defined in a project plan.
165
proprietary software
Software that is the legal property of an entity.
166
query
A question posed by a user to a database to request database information. The database returns the query results based on the criteria supplied by the user in the query.
167
QuickTime
A plug-in developed by Apple Computer for storing movie and audio files in digital format.
168
QuickTime Movie (MOV)
Standard file format for Apple QuickTime; uses the .mov, .moov or .qt file name extension.
169
record
A collection of information in a database table consisting of one or more related fields about a specific entity, such as a person, product or event.
170
relational database
A database that contains multiple tables related through common fields.
171
relationship
A connection between two or more database tables that is based on a field that the tables have in common.
172
relative URL
A URL that gives an abbreviated path to a resource using the current page as a starting position.
173
replication
The practice of copying data from one source, such as a database, to another.
174
Request for Comments (RFC)
A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
175
resource
A person, department or device needed to accomplish a task.
176
Return On Investment (ROI)
Profit earned as a result of a project relative to the value of resources required to complete it.
177
Rich Text Format (RTF)
Portable text file format created by Microsoft that allows image insertion and text formatting; an almost universal format.
178
root-level server
A server at the highest level of the Domain Name System.
179
router
A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.
180
scalable
The ability for a system to function well when its workload is increased or hardware is added to meet user need.
181
scope
The goals and tasks of a project, and the work required to complete them.
182
scope creep
Gradual increases in project scope that can undermine the success of a project.
183
screen saver
A graphic or moving image that appears on your screen when your computer is idle.
184
search engine
A powerful software program that searches Internet databases for user-specified information.
185
search engine optimization (SEO)
The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing.
186
Secure Copy (SCP)
A program used with Secure Shell (SSH) to transfer files between systems.
187
Secure MIME (S/MIME)
Secure version of MIME that adds encryption to MIME data.
188
Secure Sockets Layer (SSL)
A protocol that provides authentication and encryption, used by most servers for secure exchanges over the Internet. Superseded by Transport Layer Security (TLS).
189
security analyst/consultant
An individual who examines an organization's security requirements and determines the necessary infrastructure.
190
security manager
An individual who manages the security measures used to protect electronic data.
191
semantic Web
A Web 2.0 implementation by which Web data is contextualized with the addition of machine-readable metadata.
192
SEO analyst
An individual who determines the visibility of Web sites across multiple clients and search engines.
193
server
A computer in a network that manages the network resources and provides, or serves, information to clients.
194
server administrator
An individual who manages and maintains network servers.
195
shared domain
A hosting service that allows multiple entities to share portions of the same domain name.
196
Simple Mail Transfer Protocol (SMTP)
The Internet standard protocol for transferring e-mail messages from one computer to another.
197
smartphone
A mobile phone with advanced computing ability and Internet connectivity. Smartphones combine a mobile phone, camera, video recorder, global positioning system, touch screen, Web browser and wireless high-speed Internet connectivity into one device.
198
snail mail
Slang term for the standard postal service.
199
social networking
The practice of creating networks of friends, associates and clients who can discuss topics in common. Online social networking is a powerful concept used by individuals and businesses worldwide.
200
spam
Unsolicited and unwanted e-mail messages; the online equivalent of junk mail.
201
spam filter
An e-mail client program that identifies and filters out spam messages before they reach the e-mail Inbox.
202
spim
Spam that is delivered through instant messaging.
203
spyware
A software application secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
204
SSH File Transfer Protocol (S/FTP)
A file transfer protocol that allows the encryption of transmissions using the Secure Shell (SSH) protocol.
205
SSL/TLS-enabled FTP (FTPS)
FTP that runs on an SSL/TLS-secured connection.
206
stakeholder
A person or group with an interest in a project, and with the power to exert influence (either positive or negative) over the project and affect results.
207
standard
A definition or format that has been approved by a recognized standards organization.
208
Statement Of Work (SOW)
A contract to initiate a project; the contract contains project goals and specifies how those goals will be met.
209
streaming media
A continuous flow of data, usually audio or video files, that assists with the uninterrupted delivery of those files into a browser.
210
Structured Query Language (SQL)
A language used to create and maintain professional, high-performance corporate databases.
211
symmetric encryption
An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption.
212
table
A collection of data about a limited topic, organized into rows and columns in a database.
213
tablet
A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.
214
Tagged Image File Format (TIFF)
Commonly used graphic file format, developed by Aldus Corporation; uses the .tif or .tiff file name extension.
215
task
A unit of work that must be accomplished during the course of a project.
216
text messaging
A method of person-to-person communication in which users type short text messages from mobile phones.
217
top-level domain
The group into which a domain is categorized, by common topic (company, educational institution) and/or geography (country, state).
218
trackback
A method by which a blogger receives notification when other bloggers link to his or her blog entry.
219
Transmission Control Protocol/Internet Protocol (TCP/IP)
A suite of protocols that turns data into blocks of information called packets, which are then sent across the Internet. The standard protocol used by the Internet.
220
Transport Layer Security (TLS)
A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.
221
trojan
A program disguised as a harmless application that actually produces harmful results.
222
Twitter
A social networking and blogging site that allows individuals to communicate via short messages (www.twitter.com).
223
typosquatting
The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.
224
unified communications (UC)
A business trend that seeks to simplify and integrate all forms of communication. Also, a set of technologies that enable voice to be converted into text, and vice versa.
225
Uniform Resource Identifier (URI)
A standardized method of referring to a resource using a text string.
226
Uniform Resource Locator (URL)
A text string that specifies an Internet address and the method by which the address can be accessed.
227
update
A file or collection of tools that resolves system liabilities and improves software performance.
228
Usenet (User Network)
A collection of thousands of Internet computers, newsgroups and newsgroup members using Network News Transfer Protocol (NNTP) to exchange information.
229
user name
A unique name or number that identifies you when logging on to a computer system or online service. In an e-mail address, the part before the @ symbol.
230
vector graphics
Resizable images that are saved as a sequence of vector statements, which describes a series of points to be connected.
231
viewer
A scaled-down version of an application; designed to view and print files.
232
virtual domain
A hosting service that allows a company to host its domain name on a third-party ISP server.
233
Virtual Network Computing (VNC)
A program that allows you to control a computer at a remote location.
234
virus
A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
235
Visual Basic
The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language.
236
Visual Basic Script (VBScript)
Scripting language from Microsoft derived from Visual Basic; used to manipulate ActiveX scripts.
237
Voice over IP (VoIP)
A technology that converts voice into data packets for transmission over a packet-switched IP network. Allows the use of the Internet for real-time voice and video traffic.
238
Waveform (WAV)
Windows standard format for audio files.
239
Web 2.0
A concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities.
240
Web application developer
An individual who develops primarily server-side Web applications.
241
Web architect
An individual who creates the overview plan of a Web site's development.
242
Web browser
A software application that enables users to access and view Web pages on the Internet.
243
Web feed
A data format for delivering Web content that is updated frequently.
244
Web marketing manager
An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
245
Web page
An HTML document containing one or more elements (text, images, hyperlinks) that can be linked to or from other HTML pages.
246
Web site
A World Wide Web server and its content; includes multiple Web pages.
247
Web site analyst
An individual who analyzes Web site statistics to determine the site's effectiveness.
248
Web site designer
An individual who is responsible for the organization and appearance of a Web site.
249
Web site manager
An individual who manages a Web development team.
250
Web-based e-mail
Free e-mail service from a provider such as Windows Live Hotmail or Yahoo! in which you request a user name. You can access your e-mail from any computer that has access to the Internet.
251
Webcast
An audio and/or video Web event that is distributed over the Internet.
252
Webinar
An interactive Web-based seminar or training session.
253
wide area network (WAN)
A group of computers connected over an expansive geographic area so their users can share files and services.
254
wiki
A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and access to the Internet.
255
wireless access point (AP)
A device that enables wireless systems to communicate with each other, provided that they are on the same network.
256
wizard
A tool that assists users of an application in creating documents and/or databases based on styles and templates. Also a tool that guides users step-by-step through a software installation process.
257
World Wide Web (WWW)
A set of software programs that enables users to access resources on the Internet via hypertext documents.
258
worm
A self-replicating program or algorithm that consumes system resources.
259
xDSL
Collectively, the variations of Digital Subscriber Line (DSL), which include ADSL, RADSL and HDSL.
260
XMLHttpRequest
An application programming interface (API) that is used to transfer XML and other text data between a Web server and browser.
261
Advanced Research Projects Agency (ARPA)A U.S. Department of Defense agency that created the first global computer network.
A U.S. Department of Defense agency that created the first global computer network.