Saturday, March 5, 2011

Vocab words #4

1) IndexesAn alphabetical list of names and subjects, with references to the places where they occur, normally found at the end of a book.

2) Keywordsa word or identifier that has a particular meaning to the programming language.
3) Libel-A published false statement that is damaging to a person's reputation
4) Link Liststore collections of data.

5) Math Symbolsa listing of common symbols found within all branches of mathematics.



6) News FeedAn electronic transmission of news.



7) Peer-to- Peer (P2P)A method of sharing files with other people via the Internet.



8) Phrase Searchinga search process that allows you to combine words so that you only get records where the words are next to each other in the order specified.
9) Plagiarisma piece of writing that has been copied from someone else and is presented as being your own work.
10) Podcatchera software application that automatically checks podcast feeds and automatically download new items.
11) Public Domainfree for everyone to use without asking for permission or paying royalties.
 12) Related Searchallows a user to perform additional searches.
13) Search Engine designed to search for information on the World Wide Web.
14) Shared bookmark- a method for Internet users to organize, store, manage and search for bookmarks of resources online.
15) Trademarka contract between code that verifies security properties of an object and code that requires that an object have certain security properties. 
16) WikiA Web site set up to allow user editing and adding of content.
17) Wildcard Character-used to represent multiple or single characters when searching for various combinations of characters 
18) Business-to-Business (B2B)Describes online transactions between one business, institution, or government agency and another.
19) Business-to-Consumer (B2C)describes activities of businesses serving consumers with products and/or services.
20) Business-to-Goverment (B2G)online communication between business and government.
21) Critical Thinkingdetermining the meaning and significance of what is observed or expressed.
22) Digital Cash money which is exchanged only electronically.
23) Electronic Commerce (e-comerce)buying and selling of products or services over electronic systems such as the Internet and other computer networks.
24) Keyless Entry Systema system designed to remotely permit or deny access to premises or automobiles.
25) Online LearningLearning delivered by Web-based or Internet-based technologies.
26) Telecommutingemployment at home while communicating with the workplace by phone or fax or modem.
27) Browser hijacking the modification of a web browser's settings by malware.
28) Brute Force Attackstrying every possible code, combination, or password until you find the right one.
29) Hackinga person who breaks into computers, usually by gaining access to administrative controls. 
30) Hardware Firewall- designed to prevent unauthorized or unwanted communications between computer networks or hosts. 

31) Keyloggertracking the keys struck on a keyboard.
32) Private Key-A key for both encryption and decryption.
33) Public Keya key that is publicly available.
34) Repetitive strain Injury (RSI)a function that occurs when the same action is repeated continuously.
35) Secure Sockets Layer (SSL)- provide security for communications over networks such as the Internet.
 36) SnifferSoftware that monitor activities over the network (private or public).
37) SpywareSoftware that enables a user to obtain information about another's computer activities by transmitting data directly from their hard drive.
38) Strong Passworda password that is difficult to detect by humans and computer programs.
39) Transport Layer Security (TLS)protocols that provide security for communications over networks such as the Internet. 
40) IC3 Certification Exam- designed to teach individuals the digital literacy skills associated with basic computer and Internet use.  


No comments:

Post a Comment