Cyber piracy: where the Internet is used to copy a digital document without authorization. Droppers: a program that when run will install a virus, Trojan horse or worm onto a hard drive, floppy disk or other memory media. Intranet: A network of networks that interconnects within a single widespread organization and uses the Internet Protocol (IP). Hierarchy:
IM-Instant Messaging: IM is a software utility that allows users connected to the Internet to send text messages and files between other IM users. PDF file: PDF is a file format that enables users to capture the overall appearance of a document and have it viewed and printed exactly the same on any computer. Podcast: digital medium consisting of an episodic series of audio, video, pdf files. Plug-N-Play: ability of a computer to detect and configure a new piece of hardware automatically Phishing: is the act of attempting to acquire information, such as username and password by masquerading as a trustworthy entity in as electronic communication Proxy server: A proxy is a computer server or software program that is part of the gateway server or another computer that separates a local network from outside networks Trojan Horse: A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. Unsubscribe: To manually remove your name and e-mail address from a mailing list, LISTSERV, or discussion group. URL: Uniform Resource Locator. The unique address of any Web document. video conferencing: To conduct a conference between two or more participants at different locations, using computer networks or the Internet to transmit audio and video data Vlog: is a blog that provides a video journal on a subject rather than just text entries.
chat or chatting: A form of interactive online communication that enables users to have real-time conversations with other people who are also online. CEO: Chief Executive Officer An acronym used as a business title in the industry. Client: The name for a computer that can request information, such as a Web page, from a server. Cookies: funny name for a noun that describes a small piece of information about you (about your computer, actually). case sensitive: A phrase used to describe whether letters are typed in uppercase or lowercase. The Communications Decency Act: The Communications Decency Act of 1996 is an Act of Congress. The Act regulates pornographic material on the internet. Shareware: paid programs, free for users for limited time or things that can be done by it. Spam: annoying undesired messages or repeated messages especially advertisement. Spider: program which is made to visit Web pages and read them to give information to search engine. Spyware: software used to collect information about someone without their knowledge. Subscribe: to authorize someone to receive or access internet content.
IP Number: it describes the way information is sent and received over the InterneO OR s an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. ISP: Internet service provider& t refers to a company that provides Internet services, including personal and business access to the Internet. MB/GB: s a multiple of the unit byte for digital information OR used to measure storage capacity Netiquette: represents the importance of proper manners and behavior online bandwidth
The amount of data that can be passed along a communications channel in a given period of time. URL
Uniform Resource Locator, an address widget that identifies a document or resource on the World Wide Web Biometrics
Biometrics refers to technologies used to detect and recognize human physical characteristics. Blog
Short for "Web Log," this term refers to a list of journal entries posted on a Web page Broadband
This refers to high-speed data transmission in which a single cable can carry a large...
Please join StudyMode to read the full document