Sunteți pe pagina 1din 3

Use the internet to find definitions/explanations for each of the following terms.

You must be prepared to explain these terms in your own words to demonstrate your understanding. INTERNET- A network of networks that is with millions of different global networks that are
linked by electronic, wireless and optical networking technologies.

M !EM- A de"ice or program that allows a comp#ter to transmit data o"er to a comp#ter.
E$. Telephone or cable lines.

%AN!&I!T'(%)*- 'ow m#ch data can tra"el o"er a company+s lines. E$. ,o#ld be the
si-e of a straw or also a pipe. Bits Per Second.

%R &*ER- A software application for retrie"ing, and presenting information reso#rces to


the web. E$. .oogle ,hrome, /irefo$ etc.

*EAR,' EN.INE- A software system that is designed to search for information on the
&orld &ide &eb. E$. .oogle, %ing etc.

META TA.- A html tag that pro"ides information abo#t a web page s#ch as who created the
page, how m#ch it is #pdated and what it+s abo#t. 01eywords that are related to the tag.2

'TT)- HyperText Transfer Protocol 'TT) defines how messages are formatted and
transmitted, and what actions &eb ser"ers and browsers sho#ld take in response to "ario#s commands.

'3)ERTE4T- A special type of database system, where ob5ects 0te$t, pict#res, m#sic,
programs2 can be linked to each other in creati"e and different ways.

I) A!!RE**(N6M%ER-

short for Internet Protocol An identifier for a comp#ter or de"ice on a T,)(I) network. Networks #sing the T,)(I) protocol ro#te messages based on the I) address of the destination.

! MAIN NAME- easy to remember name 0like cira.ca2 #sed to identify a comp#ter on the
Internet. The !omain Name *ystem 0!N*2 is a directory that connects simple names with the n#merical addresses of comp#ters on the Internet. &itho#t this system the #ser friendly Internet we rely on co#ld not e$ist.

)A,1ET *&IT,'IN.- )rotocols in which messages are di"ided into packets before
they+re sent. Each packet is then transmitted indi"id#ally and can e"en follow different ro#tes to its destination.

T,)(I)- Transmission Control Protocol/Internet Protocol. The s#ite of comm#nication formats


of data that is #sed to connect hosts on the Internet. 7

6R8(6RI- uniform resource identifier A string of characters #sed to identify a name of a


web reso#rce. Uniform Resource Locator in addition to identifying a web reso#rce specifies the means of acting #pon or obtaining the representation9 pro"iding both the primary access mechanism, and the network :location:.

&E%*ITE- A set of related web pages ser"ed from a single web domain. NETI;6ETTE- The correct or acceptable way to comm#nicate o"er the internet. /IRE&A88- A software program or piece of hardware that helps screen o#t hackers, "ir#ses,
and worms that try to reach yo#r comp#ter o"er the Internet.

1IE- A small piece of data sent from a website and stored in a #ser<s web browser while

the #ser is browsing that website.

,8 6! *T RA.E- A model of networked enterprise storage where data is stored in


"irt#ali-ed pools of storage which are generally hosted by third parties.

NET NE6TRA8IT3-

Is the term #sed to describe networks that are open to e=#al access to all. They are non-discriminatory as they do not fa"or any one destination or application o"er another.

)>)- Referred to simply as peer-to-peer, or abbre"iated P2P, a type of network in which each
workstation has e=#i"alent capabilities and responsibilities.

A!&ARE- Adware is a software application in which ad"ertising banners or pop-#ps are


displayed on yo#r comp#ter screen while the program is r#nning.

?IR6*- ,omp#ter "ir#s is a program or piece of code that is loaded onto yo#r comp#ter
witho#t yo#r knowledge and r#ns against yo#r wishes.

!ATA-MININ.- The practice of e$amining large databases in order to generate new


information.

!ENIA8

A type of attack on a network that is designed to bring the network to its knees by flooding it with #seless traffic.

/ *ER?I,E ATTA,1-

MA8&ARE- *oftware that is intended to damage or disable comp#ters and comp#ter


systems. >

)'ARMIN.- The fake practice of directing Internet #sers to a bog#s website that
impersonates the appearance of a legitimate one, in order to obtain personal information s#ch as passwords, acco#nt n#mbers, etc.

)'I*'IN.- The acti"ity of defra#ding an online acco#nt holder of financial information by


posing as a legitimate company.

*)AM- Irrele"ant or inappropriate messages sent on the Internet to a large n#mber of


recipients.

*)3&ARE- A software that enables a #ser to obtain co"ert information abo#t another<s
comp#ter acti"ities by transmitting data co"ertly from their hard dri"e.

TR @AN ' R*E- A destr#cti"e pro5ram that mas=#erades as a benign application. 6nlike
"ir#ses, Tro5an horses do not replicate themsel"es b#t they can be 5#st as destr#cti"e.

& RM- A self-replicating malware comp#ter program. It #ses a comp#ter network to send
copies of itself to other nodes 0comp#ters on the network2 and it may do so witho#t any #ser inter"ention. This is d#e to sec#rity shortcomings on the target comp#ter.

S-ar putea să vă placă și