Computing Essentials Ch.2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Internet security suite

a collection of utility programs designed to protect your privacy and security on the Internet; Ex: McAfee and Norton

thread

a sequence of ongoing messages on the same subject

Telnet

an Internet standard that helps you to connect to a remote computer on the Internet, and use it as if you were on the terminal in the next room.

B2B

business-to-business e-commerce; most widely used applications: e-banking, stock trading, e-tailing; use web storefronts and web auctions

common internet uses

common uses: communication (e-mail, discussion groups), shopping (cybermalls, e-retailing), searching (virtual libraries), entertainment, and education (e-learning)

webmasters

develop and maintain Web sites and Web resources; work with the marketing department to increase traffic flow

electronic commerce

e-commerce; buying and selling of goods over the Internet; 3 basic types: B2C, B2B, and C2C

instant messaging (IM)

extends e-mail to support live communication with friends (buddies, contacts); IM programs include: video conference features, file sharing, and remote assistance; Ex: AOL, MSN, Yahoo

FTP

file transfer protocol; an Internet standard for transferring files; includes downloading and uploading

specialized search engines

focus on subject-specific Web sites; Ex: environment, fashion, history, law, medicine (medsite.com)

flaming

insulting, putting down, or attacking

Web (www, world wide web)

introduced in 1992 at CERN

anti-spam programs

junk mail filters, spam blockers; identify and eliminate spam; CAN-SPAM Act

internet

launched in 1969 with ARPANET, the Net consists of the actual physical network made up of wires, cables, and satellites.

communication

most popular internet activity; includes e-mail, spam, discussion groups, and instant messaging

security

pmts must be fast, reliable, and secure; 3 basic types: check, credit card, electronic cash (e-cash, cybercash, digital cash)

plug-ins

programs that are automatically loaded and operate as part of a browser; enrich content

browsers

programs that provide access to the Internet; allow you to surf/explore; Ex: Mozilla, Netscape, IE; requires the location/URL of the resource; interprets HTML commands and displays document as a webpage

lurking

reading news but not joining in to contribute

RFD

request for discussion

search tools

search services/providers; maintain huge Web site databases to locate info.

saint

someone who aids new users by answering questions

wizard

someone who has comprehensive knowledge about a subject

search engines

specialized programs that help locate info on the Web/Internet; includes Keyword and Directory/Index searches

web utilities

specialized utility programs that make using the Internet/Web easier and safer; Ex: Telnet, FTP, Plug-ins, filters, internet security suites

metasearch engines

submit search requests to several search engines simultaneously; duplicate sites are eliminated, hits ordered, anda composite hit list is presented; Ex: dogpile, mamma, profusion, metacrawler, search

hypertext markup language (HTML)

Hyper Text Markup Language; the commands to display Web pages; uses connections called hyperlinks/links

web auctions

C2C; similar to traditional auctions; 2 types: auction house sites and person-to-person auction sites

ISP

Internet Service Providers; the most common way to access the Internet; already connected; includes national service providers, regional service providers, and wireless service providers

uniform resource locator (URL)

Uniform Resource Locator; locations, addresses to Web resources; has two parts: protocol and domain name/top level domain, and domain code (identifies organization type)

discussion group terms

terms: flaming, lurking, RFD, saint, thread, wizard

email (electronic mail)

the transmission of electronic messages.Basic parts: header (including addresses, subject, and attachments), message, and signature line

spam

unwanted and unsolicited e-mail that may include a computer virus (destructive programs)

discussion groups

use e-mail to communicate with people who may have never met; include: mailing lists, newsgroups, and chat groups; have separate terms

filters

used by parents and organizations to block certain sites and to monitor use of the Internet/Web; Ex: cyberpatrol, netnanny

web storefronts

virtual stores for B2C; use web storefront creation packages (commerce servers)

commerce servers

web storefront creation packages; programs for creating virtual stores


Set pelajaran terkait

Healthful Living - Unit 2: Lesson 8

View Set

30-Hr. TX Law of Promulgated Contracts Course

View Set

AFRO-LATIN AMERICAN AND POPULAR MUSIC

View Set

10.¿QUÉ HACES TODOS LOS DÍAS?

View Set

Money and Banking (Ch. 15 and 16)

View Set

CompTIA Security+ Cert Prep 2: Secure Code Design and Implementation

View Set

Physics Chapter 34 - Calculating Power Practice

View Set

CHAPT 25 - Health Promotion for the 21st Century

View Set

Chap 24.1 Functions of the Digestive System

View Set

Getting Started with Java - Chapter 2

View Set

smartbook learnsmart ch8, & ch9, ch10, ch11

View Set