Friday, December 31, 2010

IC3 certification exam

40.) a test that provides students and job-seekers with the foundation of knowledge they need to succeed in environments that require the use of computers and the Internet

transport layer security (TLS)

39.) are cryptographic protocols that provide security for communications over networks such as the Internet

strong password

38.) is a password that is difficult to detect by humans and computer programs

spyware

37.) computer software that obtains information from a user's computer without the user's knowledge or consent

sniffer

36.) a software that monitor activities over the network either private or public

secure sockets layer (SSL)

35.) a security technology that is commonly used to secure server to browser transactions

repetitive strain injury (RSI)

34.) is an injury caused by repeating the same action over and over again

public key

33.) the public one of the two keys used in asymmetric cryptography

private key

32.) the unpublished key in a cryptographic system that uses two keys

keylogger

31.) a device or program that captures activities from an input device

hardware firewall

30.) safeguard the network from the outside threats and intrusions

hacking

29.) breaks into computers, usually by gaining access to administrative controls

brute force attacks

28.) a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his task easier

browser hijacking

27.) the modification of a web browser's settings by malware

telecommuting

26.) employment at home while communicating with the workplace by phone or fax or modem

online learning

25.) education that happens online via computer

keyless entry system

24.) designed to remotely permit or deny access to premises or automobiles

electronic commerce (e-commerce)

23.) consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks

digital cash

22.) refers to money or scrip which is exchanged only electronically

critical thinking

21.) involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true

Thursday, December 30, 2010

business-to-government (B2G)

20.) encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing

business-to-consumer (B2C)

19.) describes activities of businesses serving end consumers with products and/or services

business-to-business (B2B)

18.) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer

wildcard character

17.) an asterisk (*) or question mark (?) character used to represent multiple (*) or single (?) characters when searching for various combinations of characters in alphanumeric and symbolic names

wiki

16.) a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor

trademark

15.) a contract between code that verifies security properties of an object and code that requires that an object have certain security properties

shared bookmark

14.)

search engine

13.) a computer program that retrieves documents or files or data from a database or from a computer network

related search

12.) suggests alternative search phrases, allowing the user to perform additional searches with a single click

public domain

11.) property rights that are held by the public at large

podcatcher

10.) a computer program used to download various media via an rss or xml feed

plagiarism

9.) a piece of writing that has been copied from someone else and is presented as being your own work

phrase searching

8.) a search engine may provide an option to search a set of words as a phrase, either by typing in quotation marks (""), by using a command, or by clicking a button

peer-to-peer (P2P)

7.) a system in which two or more nodes or processes can initiate communications with each other

news feed

6.) a data format used for providing users with frequently updated content

math symbols

5.) this is a listing of common symbols found within all branches of mathematics

link list

4.) a confederation of websites that operates similarly to a web ring

libel

3.) a false and malicious publication printed for the purpose of defaming a living person

keywords

2.) a word or identifier that has a particular meaning to the programming language

MP 3 Set #4 indexes

1.)  a numerical scale used to compare variables with one another or with some reference number

Friday, December 24, 2010

secure sockets layer

30.) are cryptographic protocols that provide security for communications over networks such as the Internet

feed

29.) to support or promote

directories

28.) an alphabetical list of names and addresses

copyright

27.) a document granting exclusive right to publish and sell literary or musical or artistic work



boolean logic

26.) a system of symbolic logic devised by George Boole; used in computers



blog

25.) read, write, or edit a shared on-line journal

wiki

24.) ( ) is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor



webapp

23.) a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet



website

22.) a computer connected to the internet that maintains a series of web pages on the World Wide Web



web cache

21.) the caching of web documents to reduce bandwidth usage, server load, and perceived lag; stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met