CS160 Introduction to Information Technology

Final Online Examination

Home | About Our School | Courses Offered | Link | Final Online Examination | Contact Us

Some IT Terms:

.NET FRAMEWORKS

           

It is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

 

ACTIVE SERVER PAGES (ASP),

It is also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).

 

ACCESS

            Access is simply being able to get to what you need. Data access is being able to get to (usually having permission to use) particular data on a computer. Web access means having a connection to the World Wide Web through an access provider or an online service provider such as America Online.  For data access, access is usually specified as read-only access and read/write access.

 

ACCESS PRIVILEGES

            It provide a level of security, preventing users from tampering with aspects of the in which system they don't belong. Access privileges also allow a system to provide customized interfaces to users based on their roles in group interactions.

 

ACTIVE HYPERLINK

 

            A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

 

ADMINISTRATOR (as an IT resource)

            It provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment and can assist you in meeting regulatory requirements.

 

AUTHENTICATION

 

            The exchange of security information in order to verify the claimed identity of a communications partner.  The act of identifying or verifying the eligibility of a workstation, originator, or individual to access specific categories of information. It is the process of determining whether someone or something is, in fact, who or what it is declared to be, based upon credentials provided such as user ID and password combination.  It is the process of determining whether someone or something is, in fact, who or what it is declared to be.

 

 DATA ADMINISTRATOR

            A person who coordinates activities within the data administration department. Same as "database analyst

 

 

ELECTRONIC COMMERCE (ecommerce)

           

The purchase and distribution of goods and services across the Internet.

 

ELECTRONIC GOVERNMENT (eGovernment)

It is also known as e-gov, digital government, or online government): The application of information and communications technology to enhance the effectiveness of a legislature, judiciary, or administration, either to improve efficiency or to change the relationships between citizen and government, or both. The primary delivery models are government-to-consumer (G2C), government-to-business (G2B), and government to government (G2G).

 

ENCRYPTION

 

            A way of coding information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read.  The conversion of data into a form that cannot be readily understood by unauthorized people, to ensure that only the intended recipient is allowed to read the data. The term applies to both data in transit (communications) and stored data.

 

 INFORMATION TECHNOLOGY

 

Includes matters concerned with the furtherance of computer science and technology, design, development, installation and implementation of information systems and applications.

 

 INFORMATION TECHNOLOGY RESOURCE (IT Resource)

           

A resource used for electronic storage, processing or transmitting of any data or information, as well as the data or information itself. This definition includes but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related electronic equipment that electronically stores such communications.

 

INTELLECTUAL PROPERTY RIGHTS (IPR)

            Protects the intangible property created by corporations or individuals that is protected under copyright, trade secret and patent laws.  IPR are temporary grants of monopoly intended to give economic incentives for innovative activity.

 

ISO

 

International Organization for Standardization, a voluntary, non-treaty, nongovernment organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations.  International Organization for Standardization, the group that developed the OSI protocols.

 

 

 MALICIOUS CODE

            Viruses and worms are related classes of malicious code; as a result they are often confused. Both share the primary objective of replication. However, they are distinctly different with respect to the techniques they use and their host system requirements. This distinction is due to the disjoint sets of host systems they attack. Viruses have been almost exclusively restricted to personal computers, while worms have attacked only multi-user systems.

 

MALWARE (virus) Detection Software

           

Any program or file that is harmful to a computer

user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.

 

PATCH

           

A repair job for a piece of programming software. Patches are usually released for three reasons:

 

1. To fix faults in an application or operating system.

2. To alter functionality or to address a new security threat.

3. To change or modify software configuration to make it less susceptible    to attacks and more secure.

 

 

 PURGE

           

It refers to the persistent free online multiplayer FPS that you can download, install and join the Battle all completely free, originally released on 2002.

             

 REMOTE ACCESS

           

            The ability of a resource to access the state’s network via an

external network connection. Remote access generally occurs from remote locations such as homes, hotel rooms, and off-site offices; however, it may also occur locally within an agency’s physical facilities.

            1. LAN-to-LAN connection - A dial-up connection is used to setup a connection between two local area networks over the Internet. This  arrangement is called a LAN-to-LAN connection. When a user on one network access a resource on another network, the remote access device automatically dials the nearest ISP access number to establish a connection to the appropriate remote site.

 

2. Client-to-LAN connection - The remote user dials into the nearest ISP access number to connect with the ISP’s remote access server, which then forwards the traffic to central site system. This arrangement saves on long distance toll charges and eliminates the need for remote access servers at the central site.

 

 SOCIAL ENGINEERING

 

            1) A non-technical kind of intrusion that relies heavily on

human interaction and often involves tricking other people to break normal security procedures, e.g., theft, trickery, coercion, to steal passwords, keys, userids, telephone numbers used for remote dial in, and tokens;

2) A term used among hackers and for

cracking techniques that rely on weaknesses in human nature rather than software.

 

 

SPOOFING

           

An attempt by an unauthorized entity to gain access to a system by posing as an authorized user. Also, sending messages or e-mail under a false identity.

 

 

 Strong Encryption

 

It is integrated into Private Encryptor™ when you install it, so to uninstall, you need to uninstall Private Encryptor™.

 

 User ID

 

The string of characters that identifies you. The name by which you are known to the network. Also known as username.  It is the identifier by which a person or entity is recognized.

 

 

 

Enter supporting content here

lamodj@yahoo.com