CS 160 Introduction to Information Technology
Final Online Exam
Home
About Our School
Programs
Links
Final Exam
Final Online Exam
Contact Us

NET Framework

NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

ASP
Active Server Pages - a scripting language created by Microsoft for dynamically created web pages and database functions. Web pages created with ASP usually have an .asp suffix.

Access
Access is simply being able to get to what you need. Data access is being able to get to (usually having permission to use) particular data on a computer. Web access means having a connection to the World Wide Web through an access provider or an online service provider such as America Online.

Access Privileges




Active Hyperlink

A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

Administrator

A person who manages a computer, a network or specific software components. In a personal computer, users are typically the administrators, also known as "system administrators" and have rights to perform all operations in the computer.

Authentication

The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.

Data Administrator

A person who coordinates activities within the data administration department. Same as "database analyst."

E-commerce

Performing business transactions on the Internet - which may include the use of credit cards, 'shopping trolleys', forms, and secure servers.

E-government

A generic term that refers to any government functions or processes that are carried out in digital form over the Internet. Local, state and federal governments essentially set up central Web sites from which the public (both private citizens and businesses) can find public information, download government forms and contact government representatives.

E-government also refers to the standard processes that different government agencies use in order to communicate with each other and streamline processes.

Encryption

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

Information Technology

IT (information technology) is a term that encompasses all forms of technology used to create, store, exchange, and use information in its various forms (business data, voice conversations, still images, motion pictures, multimedia presentations, and other forms, including those not yet conceived). It's a convenient term for including both telephony and computer technology in the same word. It is the technology that is driving what has often been called "the information revolution."

Information Technology Resource (ITR)

Includes, but is not limited to computers, databases, software, servers, and the Champaign County Information Network (CCIN); files, folders, and documents; Internet access and web pages; and electronic mail including both Intranet and Internet.

Intellectual Property Right

Intellectual property refers to the ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations. It also refers to digital media, such as audio and video clips that can be downloaded online.

ISO

ISO, founded in 1947, is a worldwide federation of national standards bodies from some 100 countries, with one standards body representing each member country.
According to ISO, "ISO" is not an abbreviation. It is a word, derived from the Greek isos, meaning "equal", which is the root for the prefix "iso-" that occurs in a host of terms, such as "isometric" (of equal measure or dimensions) and "isonomy" (equality of laws, or of people before the law).

Malicious Code

Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content.

Malware (virus) Detection Software

Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection, malware writers use various obfuscation techniques to transform their malware.

Patch

Also called a service patch, a fix to a program bug. A patch is an actual piece of object code that is inserted into (patched into) an executable program. Patches typically are available as downloads over the Internet.

Personal IT Resources





Purge

To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible to regain deleted objects by undeleting them, but purged objects are gone forever.

Remote Access

The ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds.

Social Engineering

In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game".

Spoofing

Faking the sending address of a transmission in order to gain illegal entry into a secure system.

Strong Encryption

An encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.

UserID

A number or name which is unique to a particular user of a computer or group of computers which share user information. The operating system uses the uid to represent the user in its data structures, e.g. the owner of a file or process, the person attempting to access a system resource etc.





Enter supporting content here

alcalaeloisa_06@yahoo.com