ch 5 and 6 concept

Your page rank:

Total word count: 815
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

World wide web

a collection of millions of web sites

web site

a collection of related web pages connected by hyperlinks

mosaic

the first graphical web browser released in 1993

web page

a hypertext markup language (HTML) documant

text messaging

another term for SMS, messages of less than 160 characters sent via a cellular netowkr

Blog

is an informal website of time stamped articles written in journal format

wiki

is a collaboraitive website that people use to communicate with each other

podcast

is an audio file distributed through downloads or feeds

source

If youre sending an email message from your laptop to a classmate, the laptop is the

social network

is a web site where members share interests, ideas, and information

Tweet

a post to a microblog such as twitter

blog

a web page listing jornal entries that provide commentary and information, usually about a particular interest

wiki

a type of web page that a group of people can comment on and make changes to

citizen journalist

members of the public who report on current events

asynchronous

Type of communication, such as blogging, where authors and readers do not need to be online at the same time

B2C

e-commerce model where businesses provide goods and services to individuals

advertising

e commerce sites sell this to generate income

click through

occurs when you click a pop up or banner advertisement on a web site and go to the advertisers web site

email forwarding

C2C web sites typically use this to connect buyers with sellers and still protect everybodys privacy

SET

a standard protocol for securing credit card transactions over the internet

General search

engine that searches web pages in its database that contain specific words or phrases

metasearch engine

offers the convenience of searching many sources from one web site

online reference

service that connects you with a human librarian

specialty search

engine that provides access to academic information for research

social search tool

Finds subjective content, such as comments, reviews, and opinions

Disk cleanup utility

Removes unused files like temporary Internet files from your hard drive

adware

Displays unsolicited advertisements in banners or pop-up windows

disk defragment

Reorganizes the data on a magnetic hard drive so that you can access files more quickly

Recycle Bin

Not emptying this lets files remain on your computer and take up space

virus protection

Software that scans incoming messages and programs to protect your computer

Worm

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

virus

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

spyware

Type of malware that collects bits of data, like your surfing habits

piggybacking

A slowed down Wi-Fi connection can be the result of this

phishing

Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information

White Hat

Type of hacker who wants to show off their skills and doesn’t intend any serious damage

hurricanes and storms

Events that account for almost half of total catastrophic data losses

uninterruptible

Type of power supply/battery backup device that can prevent some forms of data loss

Black Hat

Type of hacker who intends serious harm through espionage, theft, or disruption of a network

cyberterrorism

Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people

Components of an online profile

Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons

Report abuse quickly

First step to take when being cyberbullied or cyberstalked

Netiquette

A set of online communication practices and rules

Identity theft

The nations fastest growing crime, where victims are unaware its being committed until the damage is done

Drivers license, birth certificate

Items an identity thief can obtain to impersonate you

Firewall

Security feature often built into operating systems

J0$e186#nk

A strong password

username

A unique name you create to identify yourself to a computer system

authentication

Method used to verify the identity of computer users

WPA2

A high level of encryption for wireless devices

Spyware

Software secrectly installed on networked computers that tracks and transmits personal data without your knowledge or permission

Malware

Common forms include computer viruses, Trojan horses, and worms

Cookie

Used by commercial Web site vendors to identify users and customize Web pages

Adware

Displays unwanted advertisements in banners or pop-up windows on your computer

Bot

Computer taken over by hackers to perform malicious tasks across a network

https://

indication that a web site is secure for shopping

phishing

Emails that might appear to come from your bank or credit card company, asking you for email logon or personal information

electronic wallet

one secure method of online payment

misspelled company name

indication that a web site is not secure

money transfer

Online payment method to avoid

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending