40.) a test that provides students and job-seekers with the foundation of knowledge they need to succeed in environments that require the use of computers and the Internet
Friday, December 31, 2010
transport layer security (TLS)
39.) are cryptographic protocols that provide security for communications over networks such as the Internet
spyware
37.) computer software that obtains information from a user's computer without the user's knowledge or consent
brute force attacks
electronic commerce (e-commerce)
23.) consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks
critical thinking
21.) involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true
Thursday, December 30, 2010
business-to-government (B2G)
20.) encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing
business-to-business (B2B)
18.) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer
wildcard character
17.) an asterisk (*) or question mark (?) character used to represent multiple (*) or single (?) characters when searching for various combinations of characters in alphanumeric and symbolic names
wiki
16.) a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor
trademark
15.) a contract between code that verifies security properties of an object and code that requires that an object have certain security properties
search engine
13.) a computer program that retrieves documents or files or data from a database or from a computer network
related search
12.) suggests alternative search phrases, allowing the user to perform additional searches with a single click
plagiarism
9.) a piece of writing that has been copied from someone else and is presented as being your own work
phrase searching
8.) a search engine may provide an option to search a set of words as a phrase, either by typing in quotation marks (""), by using a command, or by clicking a button
Friday, December 24, 2010
secure sockets layer
30.) are cryptographic protocols that provide security for communications over networks such as the Internet
wiki
24.) ( ) is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor
webapp
23.) a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet
website
22.) a computer connected to the internet that maintains a series of web pages on the World Wide Web
web cache
21.) the caching of web documents to reduce bandwidth usage, server load, and perceived lag; stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met
Subscribe to:
Posts (Atom)