CAC CIS 120 Chapters 1,3,9,13
Client computer
A computer connected to the Internet that asks for data
Key pair
In public-key encryption, the two keys—one for coding and one for decoding
Top-level domain
In the URL http://www.microsoft.com/surface, the portion labeled ".com"
Protocol
In the URL http://www.microsoft.com/surface, the portion labeled "http"
Quarantining
Regarding computer protection; placing a found virus in a secure area on the hard drive
Strong Passwords
Rules for creating passwords include all of the following: keep your password a secret, change your password frequently, use letters, numbers, and symbols in your passwords, but does NOT include: keep a master password that is the same for all of your accounts
Web browser
Software that enables you to display and interact with text and other media on the web
Secure socket layer
The "s" in "https" stands for "secure".
Digital divide
The gap in ease of access to the Internet and technology
Internet backbone
The main path of the Internet along which data travels the fastest
Screen resolution
The number of pixels displayed on the screen
Computer literate
The term is used to describe someone who is familiar enough with computers to understand their capabilities and limitations.
URL (Universal Resource Locator)
The unique address for a particular website
Crowdfunding
Using the Internet to get small donations from many people to start a business
DNS (Domain Name Server)
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a DNS.
Pharming
When malicious code is planted on your computer and alters your browser's ability to find web addresses
Zombie
a computer controlled by a hacker
The Internet
a large network of networks
Breadcrumb trail
a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website.
Spyware
a program that gathers information about your surfing habits without your knowledge.
Applet
a small program that resides on a server and is designed to be downloaded and run on a client computer.
Dynamic address
a temporary IP address that is assigned from an available pool of IP addresses.
IP address
a unique number that identifies a computer, server, or device connected to the Internet
Macro virus
a virus that is attached to documents such as Word or Excel files.
Wiki
allows users to add, remove, or edit its content.
Social engineering
any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Worm
attempts to travel between systems through network connections to spread an infection
Catfishing
creating fake profiles on a dating site and developing a fabricated online and phone relationship
Cybercrime
formally defined as any criminal action perpetrated primarily through the use of a computer
ICANN
is responsible for the Internet's domain name system and the allocation of IP addresses.
Virus signature
is the portion of virus code that is unique to a particular computer virus.
Collaborative consumption
joining together as a group to use a specific product more efficiently.
Scareware
malware on your computer used to convince you that your computer has a virus
Packet filtering
method for selectively allowing certain requests to access ports
Rootkit
programs that allow hackers to gain access to your computer without your knowledge
Virtual reality
replaces perceived reality with a different world.
Spear fishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data.
HTTP (Hyper Text Transfer Protocol)
was created for the transfer of hypertext documents across the Internet
Firewall
Blocks logical ports from invaders and make your computer invisible to others on the Internet. Hardware or software for protecting computers from hackers.
Kilobyte
Compared to Megabyte, Gigabyte, and Petabyte; Kilybyte is the smallest unit of measure
E-commerce business
All of the following are types of e-commerce business B2C, B2B, and C2C. C2B is NOT a type of e-commerce business.
Computer forensics
Analyzing computer systems to gather potential legal evidence