GO! All in One Computer Concepts & Applications Final Ch 5-8
Dogpile
_______ is a metasearch engine for information on the World Wide Web that fetches results from Google, Yahoo!, and Yandex, and includes results from several other popular search engines, including those from audio and video content providers.
Distributed Denial-of-Service (DDoS) attack
_______occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. An attack that is perpetrated by sending out so much traffic that it cripples a server or network
Metasearch Engine
A search engine that searches other search engines. Dogpile, searches other search engines rather than individual Web sites. A program used by search engines that constantly collects information on the Web, following links in Web sites and reading Web pages. Kayak - search engine of all travel sites
Search Engine Spiders
A program sent out by a search engine to crawl the web and gather information
Trojan Horse
A program that appears to be a legitimate program but that is actually malicious
Patching Software (Patch or Hotfix)
Addresses individual problems as they are discovered
Bitmap Examples
Paint Programs, Corel Paint, Adobe Photoshop, Photo Apps etc - GIF, JPEG (JPG), PNG, BMP, TIFF (TIF)
Drive Imaging Software
The process of creating a mirror image of an entire hard disk. Cloning software is a range of tools designed to make a complete copy of a hard drive to an image file.
Analytics
The process of detecting patterns in data. A process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision-making
Internet Protocol (IP)
The protocol responsible for addressing and routing packets to their destination
Secure Sockets Layer (SSL)
The protocol that encrypts data before it is sent across the Internet is ______
Hyper Text Transfer Protocol
The set of communication rules used by your computer to connect to servers on the web
Tracks
The set of concentric circles that are created after low-level disk formatting occurs are the
Bandwidth
The speed or data transfer rate of a network
Internet Service Provider (ISP)
Your IP address is most likely provided by your _____
C2B
_____ is NOT one of the three main e-commerce categories
VoIP
______ enables calls to be transmitted over the Internet instead of over traditional telephone lines
Digital Footprint
______ includes all the information that someone can find out about you by searching the web, including social network sites
Open Source
______ means that a program's source code is published and made available to the public allowing it to be copied, modified and redistributed at no cost
Cloud Computing
______ refers to applications and services that are accessed over the Internet
Codecs
_______ are compression algorithms that reduce the size of digital media files
Pixel
A ______ is a single point on a display screen
Proprietary Software
A ______ license grants permission to use one or more copies of software, but ownership remains with the software publisher
Service Pack
A ________ addresses multiple problems in software and also adds multiple features
Copyright
A _________ protects literary and artistic works
False
A bug is a type of malware.
Bot
A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks
Forum
A conversation much like chat but not in real-time. Also known as a discussion board or message board. _____ is an online discussion site where people can hold conversations in the form of posted messages
Worms
A form of self-replicating malware that does not need a host to travel; worms travel over networks and spread over the network connections without any human intervention
Scholar
A good search tool to use when doing academic research is Google ______.
Host
A macro-enabled Word document can act as a _____ for a virus
Boolean Search
A search that uses logical operators - AND, OR, and NOT - to link the words you are searching for
Rootkit
A set of programs that enables someone to gain control over a computer system while hiding the fact that the computer has been compromised
Web Cookies
A small text file placed on your computer when you visit a website that is used to identify when you return
Safe Mode
A special diagnostic mode for troubleshooting the system that loads Windows without most device drivers
Plug-In
A third party browser extension, such as Adobe Reader
Cookies
A website may put ______ on your computer when you visit them
File Explorer
A window that displays the contents of the current location and contains helpful parts so that you can navigate within the file organizing structure of Windows
Uniform Resource Locator
An address that uniquely identifies a location on the internet. A URL is a specific type of Uniform Resource Identifier (URI),
Platform Neutrality
An application that can run on all modern personal computing systems
Vector Graphics
An application used to create math-based graphics. Creates geometrical objects, like points, lines (X & Y axis), curves, and polygons to model the image
Logic Bomb
An attack by malware that occurs when certain conditions are met. Behaves like a virus in that it preforms a malicious act such as deleting files, but does not spread. A ________ is not a type of time bomb
Viral Video
An online video that becomes extremely popular because of recommendations and social sharing. A video that gains sudden popularity
Database
An organized collection of facts about people, events, things or ideas related to a specific topic or purpose. A structured set of data held in a computer, especially one that is accessible in various ways
Web Apps
Applications that run in browsers
System Requirements
Before purchasing new software you should review your system specifications and compare them to the
E-Commerce
Conducting business on the web. Buying and selling producta or services on the Internet. (B2B, B2C, C2C)
Malware
Different programs that are designed to be harmful to your computer are called
Plagiarism
Directly quoting or paraphrasing someone else's work without permission or credit ______. Copying other people's work online.
Store and Forward
Email uses ______ technology
Reboot
If your system is frozen or stuck
Bitmapped Graphics
Images composed of tiny squares or dots that correspond to one pixel - a single point on a display screen. Images are stored as a series of tiny dots called pixels. Each pixel is actually a very small square that is assigned a color, and then arranged in a pattern to form the image
Malware
Malicious software; a program that is designed to be harmful or malicious
Short Message Service (SMS) & Instant Message (IM)
Similar services used to send brief electronic text messages to mobile devices
Dangers of Mobile Apps
Security risks, weak server side controls, risks of malicious or harmful code running on your device, insecure data storage, no encryption, Ad spamming, needless location tracking, poor authorization and authentication Mobile apps must downloaded only from trusted sources.
Customer Relations Management (CRM)
Software that is used for maintaining customer information is a(n) _____
Web Bookmarks
Term used to describe saved links to commonly visited webpages that allow for efficient web browsing
Broadband
The Federal Communications Commission defines ______ as anything over 25 Mbps.
High Definition Cables
The High-Definition Multimedia Interface (HDMI) is an audio/video interface for transmitting uncompressed digital data. The main use of an HDMI cable is to connect components such as a DVD player to a High-definition television (HDTV). HDMI is the uncompressed, all-digital standard used for High-Definition (HD) quality
Domain Name System (DNS)
The ______ enables you to use a friendly name like google.com to find a website
Internet
The ______ is a global network of computer networks
Top Level Domain Names
The end of the domain name (suffix) .com, .org, .edu, .net, .int
Office Application Suite
The most commonly used productivity software in business is a(n) ______
Hardware vs Software
The physical components of a computer vs. A set of instructions that tells the hardware how to preform a certain task. Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive.
Search Engine Optimization
To increase webpage ranking in search engine results use the ______________ technique.
Crowdsourcing
Trusting collective opinion of a crowd of people - referred to as (the wisdom of the crowd) - rather than that of an expert.
280
Tweets are limited to _____ characters
Piggybacking
Using an open wireless network to access the Internet without permission
Platform-Neutral
Web apps ______ because they can run in any browser.
Social Media Websites
Websites that enable you to create user-generated content, connect, network and share. Facebook, Tweeter, LinkedIn, Instagram, Tumblr, Pinterest - computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks.
.com
Which part of the URL http://www.pearsonhighered.com/go is the top level domain name?
Pages Edited by Users Anonymously
Wiki - a website that enables you to edit content, even if it was written by someone else. Sending a request to a specific web page through a proxy server will hide the user's IP address.
Application Software Examples
is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. Examples of an application include a word processor, a spreadsheet, computing numbers on a spreadsheet, an accounting application, a web browser, a media player, an aeronautical flight simulator, a console game or a photo editor. The collective noun application software refers to all applications collectively. MS Office, Excell, Word, Access, Quickbooks, Turbo Tax, word processor
Disk Defragmenter
is the utility that rearranges fragmented files on your disk to improve efficiency
Junk Mail
unwanted or unsolicited advertising or promotional material received through the mail or by email