2) Keywords- are the words that are used to reveal the internal structure
3) Libel-
4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field
5) Math Symbols- symbols relating to math
6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed
7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers
8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given
9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
12) Related Search-can provide suggestions for more than 90% of search
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
14) Shared bookmark-
15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
22) Digital Cash-Electronic money
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
24) Keyless Entry System- remote for cars
25) Online Learning-comprises all forms of electronically supported learning and teaching
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
29) Hacking-refers to the re-
30) Hardware Firewall-object that protects your computer
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
36) Sniffer-computer software or hardware that can intercept and log traffic
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
38) Strong Password-Automatically and safely generate strong, secure passwords
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
40) IC3 Certification Exam- to aid professional development
No comments:
Post a Comment