a | b | c | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z Show
A access point: accessibility: ActiveX: address: alias: anonymous FTP:
Anti-Spam applet: application: ASCII file: AT command set: attachment: authentication: Back to top B backbone: bandwidth: BCP: BI: binary file: BinHex: bit: blended learning: blog: bluetooth: BMP: bookmark: boolean logic: bounce: bridge: broadband connection: browser: buffer: buffered: business continuity: business continuity plan: BYOD: byte: Back to top C cable modem: cache: captcha: carrier services case-sensitive: CBT: CD-R drive: CD-ROM: CD-RW, CD-R disk: CGI: chat: client: client-server technology: cloud: cloud computing:
CMS: compress: connect: cookie: courseware: CPU: CSP: CSS: cursor: cyberspace: Back to top D DaaS: daemon: database: data center: decompress: defragmentation: degauss: desktop: DHCP: dialog box: Dial-Up Adapter: dial up connection: digital asset: digitize: DIMM: directory:
disaster recovery disaster recovery planning discussion group: distance education: distance learning: dither: DNS: domain: download: dpi: DRaaS: drag and drop: DSL: DVD: DVD-RW, DVD-R disk: Back to top E EAP: EGA: eLearning: e-mail:
e-mail archiving: emoticon: emulation: encryption: EPS: Ethernet: Ethernet card: expansion card: extension: Back to top F female connector: field:
file: filter: finger:
firewall: FireWire: flash drive: flash memory: folder: font: frames: freeware: fragmentation: FTP: Back to top G GIF: gigabyte (Gig or GB): GPS: greyware GUI: Back to top H handshaking: hard disk: hardware: header: help desk: helper application: home page: host: HTML: HTTP: hyperlink: hypertext: hypervisor: Back to top I
IaaS: icon: ICS: IEEE 1394 port: image map: IMAP: Internet: Internet Domain Management: Internet Explorer: Internet radio: IP address: IRC: IRQ: Interrupt request; refers to a number associated with a serial port on an PC or compatible computer. It usually can be changed by flipping a dip switch. Occasionally, when you're using a modem connect to the Internet, you may need to adjust the IRQ number assigned to the serial port which connects the modem to avoid conflicts with another device like your mouse. ISP: IT Assessment: IV&V: Back to top J Java: A general purpose programming language commonly used in conjunction with web pages that feature animation. Small Java applications are called Java applets; many can be downloaded and run on your computer by a Java-compatible browser like Firefox or Internet Explorer. JavaScript: JPEG: justified: Back to top K K: Kbps: Kerberos: kerning:
keyword: kilobyte (K, KB, or Kb): knowledge base: Back to top L LAN: laser printer: leading:
learning management system (LMS): learning object: link: LINUX: ListProcessor: LISTSERV, Listserver:
log in, log on: Back to top M MaaS: MAC: Macintosh: mail server: mailing list: main memory: mainframe: male connector: malware:
Managed Workstations: MAPI: MDM: megabyte (Meg or MB): MHz or mHz: menu: Microsoft Exchange: Microsoft Windows: MIME: modem: moderator: monitor: mouse: MPEG: MRB: MSP: multimedia: multitasking: Back to top N NaaS: nameserver: NAT: network: network adapter: network hub: NNTP: network monitoring: network security: Back to top O OCR: on-Cloud:
on-site: online: OpenType Back to top P PaaS: packet: palette: page: parallel port: password: PC: PDA: PDF: peer-to-peer: Perl: personality: PGP: Ph: phishing: PING: pixel: plug-in: plug and play: POP: pop-up blocker: post: PostScript: PostScript fonts: PPP: program: private cloud protocol: proxy: public domain software: pull: push: Back to top Q QoS: QuickTime: Back to top R RAM: record: registry: remote backup: remote desktop: remote login: remote monitoring: remote support: RGB: RJ-45 connector: ROM: router: RTF: Back to top S SaaS: safe mode: SAN: SATA: satellite transmission: screen reader: scroll bar: search engine: secure server: security token: Section 508: self-extracting file: serial port: server:
shareware: signature: SIMM: SMTP: software: spam: SSID: streaming (streaming
media): spyware: subdirectory: Support365® SVGA: Back to top T T-1 carrier:
T-3 carrier: 10Base-T: table: TCP/IP: Telephony: telnet: A generic term that refers to the process of opening a remote interactive login session regardless of the type of computer you're connecting to. terminal
emulation: TIFF: token: tool bar: Trojan horse: TrueType: tweet: Twitter: twisted pair cable: two-factor authentication: Back to top U UNIX:
upload: USB: username: URL: USB port: utility: uuencode: Back to top V VDI: virtual classroom: virtualization: virtual classroom: virtual hosting: virtual memory: virtual reality: virus: VoIP: VPN: VT100: Back to top W WAIS: WAN: WAP: WEP: wi-fi: wild card: window: Windows: wireless (networking) wizard: WLAN: workstation: World Wide Web: worm: WPA: WWW: WYSIWYG: Back to top X X2:
XHTML: XML: Back to top Y Back to top Z zero-day: zip: Zip drive: zoom: Back to top What is a small text file placed on your computer when you visit a website that is used to identify you when you return?What are cookies? A cookie is a small text file that a website saves on your computer or mobile device when you visit the site.
What term refers to the use of computers computer networks or the Internet?Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
Which of the following terms is used to describe a program that copies itself repeatedly using up resources and possibly shutting down the computer network?A computer worm duplicates itself to spread to uninfected computers. It often does this by exploiting parts of an operating system that are automatic and invisible to the user. Typically, a user only notices a worm when its uncontrolled replication consumes system resources and slows or halts other tasks.
What term is used to describe the process of restricting access to certain material on the Web?Content filtering is a process involving the use of software or hardware to screen and/or restrict access to objectionable email, webpages, executables and other suspicious items.
|