GO! All in One Computer Concepts & Applications Final Ch 5-8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Dogpile

_______ is a metasearch engine for information on the World Wide Web that fetches results from Google, Yahoo!, and Yandex, and includes results from several other popular search engines, including those from audio and video content providers.

Distributed Denial-of-Service (DDoS) attack

_______occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. An attack that is perpetrated by sending out so much traffic that it cripples a server or network

Metasearch Engine

A search engine that searches other search engines. Dogpile, searches other search engines rather than individual Web sites. A program used by search engines that constantly collects information on the Web, following links in Web sites and reading Web pages. Kayak - search engine of all travel sites

Search Engine Spiders

A program sent out by a search engine to crawl the web and gather information

Trojan Horse

A program that appears to be a legitimate program but that is actually malicious

Patching Software (Patch or Hotfix)

Addresses individual problems as they are discovered

Bitmap Examples

Paint Programs, Corel Paint, Adobe Photoshop, Photo Apps etc - GIF, JPEG (JPG), PNG, BMP, TIFF (TIF)

Drive Imaging Software

The process of creating a mirror image of an entire hard disk. Cloning software is a range of tools designed to make a complete copy of a hard drive to an image file.

Analytics

The process of detecting patterns in data. A process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision-making

Internet Protocol (IP)

The protocol responsible for addressing and routing packets to their destination

Secure Sockets Layer (SSL)

The protocol that encrypts data before it is sent across the Internet is ______

Hyper Text Transfer Protocol

The set of communication rules used by your computer to connect to servers on the web

Tracks

The set of concentric circles that are created after low-level disk formatting occurs are the

Bandwidth

The speed or data transfer rate of a network

Internet Service Provider (ISP)

Your IP address is most likely provided by your _____

C2B

_____ is NOT one of the three main e-commerce categories

VoIP

______ enables calls to be transmitted over the Internet instead of over traditional telephone lines

Digital Footprint

______ includes all the information that someone can find out about you by searching the web, including social network sites

Open Source

______ means that a program's source code is published and made available to the public allowing it to be copied, modified and redistributed at no cost

Cloud Computing

______ refers to applications and services that are accessed over the Internet

Codecs

_______ are compression algorithms that reduce the size of digital media files

Pixel

A ______ is a single point on a display screen

Proprietary Software

A ______ license grants permission to use one or more copies of software, but ownership remains with the software publisher

Service Pack

A ________ addresses multiple problems in software and also adds multiple features

Copyright

A _________ protects literary and artistic works

False

A bug is a type of malware.

Bot

A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks

Forum

A conversation much like chat but not in real-time. Also known as a discussion board or message board. _____ is an online discussion site where people can hold conversations in the form of posted messages

Worms

A form of self-replicating malware that does not need a host to travel; worms travel over networks and spread over the network connections without any human intervention

Scholar

A good search tool to use when doing academic research is Google ______.

Host

A macro-enabled Word document can act as a _____ for a virus

Boolean Search

A search that uses logical operators - AND, OR, and NOT - to link the words you are searching for

Rootkit

A set of programs that enables someone to gain control over a computer system while hiding the fact that the computer has been compromised

Web Cookies

A small text file placed on your computer when you visit a website that is used to identify when you return

Safe Mode

A special diagnostic mode for troubleshooting the system that loads Windows without most device drivers

Plug-In

A third party browser extension, such as Adobe Reader

Cookies

A website may put ______ on your computer when you visit them

File Explorer

A window that displays the contents of the current location and contains helpful parts so that you can navigate within the file organizing structure of Windows

Uniform Resource Locator

An address that uniquely identifies a location on the internet. A URL is a specific type of Uniform Resource Identifier (URI),

Platform Neutrality

An application that can run on all modern personal computing systems

Vector Graphics

An application used to create math-based graphics. Creates geometrical objects, like points, lines (X & Y axis), curves, and polygons to model the image

Logic Bomb

An attack by malware that occurs when certain conditions are met. Behaves like a virus in that it preforms a malicious act such as deleting files, but does not spread. A ________ is not a type of time bomb

Viral Video

An online video that becomes extremely popular because of recommendations and social sharing. A video that gains sudden popularity

Database

An organized collection of facts about people, events, things or ideas related to a specific topic or purpose. A structured set of data held in a computer, especially one that is accessible in various ways

Web Apps

Applications that run in browsers

System Requirements

Before purchasing new software you should review your system specifications and compare them to the

E-Commerce

Conducting business on the web. Buying and selling producta or services on the Internet. (B2B, B2C, C2C)

Malware

Different programs that are designed to be harmful to your computer are called

Plagiarism

Directly quoting or paraphrasing someone else's work without permission or credit ______. Copying other people's work online.

Store and Forward

Email uses ______ technology

Reboot

If your system is frozen or stuck

Bitmapped Graphics

Images composed of tiny squares or dots that correspond to one pixel - a single point on a display screen. Images are stored as a series of tiny dots called pixels. Each pixel is actually a very small square that is assigned a color, and then arranged in a pattern to form the image

Malware

Malicious software; a program that is designed to be harmful or malicious

Short Message Service (SMS) & Instant Message (IM)

Similar services used to send brief electronic text messages to mobile devices

Dangers of Mobile Apps

Security risks, weak server side controls, risks of malicious or harmful code running on your device, insecure data storage, no encryption, Ad spamming, needless location tracking, poor authorization and authentication Mobile apps must downloaded only from trusted sources.

Customer Relations Management (CRM)

Software that is used for maintaining customer information is a(n) _____

Web Bookmarks

Term used to describe saved links to commonly visited webpages that allow for efficient web browsing

Broadband

The Federal Communications Commission defines ______ as anything over 25 Mbps.

High Definition Cables

The High-Definition Multimedia Interface (HDMI) is an audio/video interface for transmitting uncompressed digital data. The main use of an HDMI cable is to connect components such as a DVD player to a High-definition television (HDTV). HDMI is the uncompressed, all-digital standard used for High-Definition (HD) quality

Domain Name System (DNS)

The ______ enables you to use a friendly name like google.com to find a website

Internet

The ______ is a global network of computer networks

Top Level Domain Names

The end of the domain name (suffix) .com, .org, .edu, .net, .int

Office Application Suite

The most commonly used productivity software in business is a(n) ______

Hardware vs Software

The physical components of a computer vs. A set of instructions that tells the hardware how to preform a certain task. Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive.

Search Engine Optimization

To increase webpage ranking in search engine results use the ______________ technique.

Crowdsourcing

Trusting collective opinion of a crowd of people - referred to as (the wisdom of the crowd) - rather than that of an expert.

280

Tweets are limited to _____ characters

Piggybacking

Using an open wireless network to access the Internet without permission

Platform-Neutral

Web apps ______ because they can run in any browser.

Social Media Websites

Websites that enable you to create user-generated content, connect, network and share. Facebook, Tweeter, LinkedIn, Instagram, Tumblr, Pinterest - computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks.

.com

Which part of the URL http://www.pearsonhighered.com/go is the top level domain name?

Pages Edited by Users Anonymously

Wiki - a website that enables you to edit content, even if it was written by someone else. Sending a request to a specific web page through a proxy server will hide the user's IP address.

Application Software Examples

is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. Examples of an application include a word processor, a spreadsheet, computing numbers on a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor. The collective noun application software refers to all applications collectively. MS Office, Excell, Word, Access, Quickbooks, Turbo Tax, word processor

Disk Defragmenter

is the utility that rearranges fragmented files on your disk to improve efficiency

Junk Mail

unwanted or unsolicited advertising or promotional material received through the mail or by email


Ensembles d'études connexes

NSG 170 MASTER FINAL COMBINATION

View Set

Chapter 22: Nursing Management of the Postpartum Woman at Risk (Chapter Worksheet)

View Set

Chapter 7: Interpreting Weather Data

View Set

Cold War, Decolonization, and Chinese Communism (Strayer Chapter 13 - Unit 8) (Not Done ALN)

View Set

Info Tech 1st Semester Exam Review

View Set