Monday, December 20, 2010
IC3 Certification Exam
IC3 Certification Exam- This is a pass exam IC3-Exam-3 in first attempt. 231 questions with detailed explanation and 259 study notes. IC3-Exam-3 - Internet - Living Online study notes, articles and mock test. 99% pass rate, 100% money back guarantee. Based on latest Certiport certi fication. Als, when like i pass this class i have i will probably get a Certification exam.
Transport Layer Security ( TLS)
Transport Layer Security ( TLS)- Its a layer providing encryption and authentication services that can be negotiated during the startup phase of many Internet protocols (eg SMTP, LDAP, IMAP, POP3). TLS is derived from SSL and uses the same certificates but does not require each service to be given a new port number; see SSL.
Strong Password
Strong Password- It is a password that is difficult to detect by humans and computer programs. A strong password consists of at least six characters including a combination of upper and lower case letters, numbers and symbols.
Spyware
Spyware-Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Also, its a computer software that obtains information from a user's computer without the user's knowledge or consent.
Sniffer
Sniffer- A Sniffer is a software program that is installed to monitor network traffic. Sniffers typically correct a certain number of characters at the beginning of a new users session to compromise their logon and password.
Secure Sockets layer (ssl)
Secure Sockets layer (ssl)- A Secure sockets layer is a security technology that is commonly used to secure server to browser transactions.
repetitive strain injury (rsi)
repetitive strain injury (rsi)-Repetitive strain injury (or chronic work related upper limb pain syndrome) is the common cause of discomfort of the wrist and arm which usually occurs in typists and computer users and is now a common cause of litigation.
public key
public key-The public key is one of the pair of keys that is used by public key encryption or (or cryptography). The public key can be made widely available to the public and can be distributed in the form of an X.509 public key certificate. It is used to encrypt data and verify digital signatures.
private key
private key-A Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret.
keylogger
keylogger- A keylogger is a computer program that captures the keystrokes of a computer user and stores them. Modern keyloggers can store additional information, such as images of the user's screen. Most malicious keyloggers send this data to a third party remotely (such as via email).
Friday, December 17, 2010
Hardware Firewall
Hardware Firewall-This is a wall of a computer when hacking someody that no matter what you do in a computer you wont be able to hack it.
Hacking
Hacking-In computing, a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures: * A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad.
Brute Force Attacks
Brute Force Attacks-This is a program that will try and gain access to shared folders on your network using methods.
Browser Hijacking
Browser Hijacking-Browser hijacking is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission. Some browser hijacking can be easily reversed, while other instances may be difficult to reverse.
Telecommuting
Telecommuting-The action of working from home, sometimes for part of a working day or week, using a computer connected to one's employer's network or via the Internet. Also, Telecommuting, e-commuting, e-work, telework, working from home (WFH), or working at home (WAH) is a work arrangement in which employees enjoy flexibility in working location and hours. In other words, the daily commute to a central place of work is replaced by telecommunication links.
Online learning
Online learning-Learning which utilizes the Internet and in which both learner and teacher utilize various subsets of the Internet repetoire of teaching and learning tools. In other words, Education that occurs online via computer.
Keyless entry system
Keyless entry system-A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar. There are several RKE systems on the market, including but not limited to KeeLoq by Microchip, HITAG by Philips, and AVR411 by Atmel.
Electronic Commerce (e-comerce)
Electronic Commerce (e-comerce)-Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
Digital cash
Digital cash-Electronic money (also known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically.Also, a system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money.
Critical Thinking
Critical Thinking-Critical thinking involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true.
Thursday, December 16, 2010
Business-to-government (b2g)
Business-to-government (b2g)-Business-to-government (B2G) is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing . Also, Denotes online communication between business entities and government.
Business-to-consumer (b2c)
Business-to-consumer (b2c)-Business-to-consumer (B2C, sometimes also called Business-to-Customer) describes activities of businesses serving end consumers with products and/or services. B2C refers to commercial electronic commerce transactions between a business and a consumer. The area of marketing and commerce in which a company sells to individuals as opposed to other businesses (natch).
Business-to-business (b2b)
Business-to-business (b2b)-Business-to-business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Contrasting terms are business-to-consumer (B2C) and business-to-government (B2G).Also, The area of marketing and commerce in which a company sells to other businesses as opposed to individuals.
Wildcard Character
Wildcard Character-The term wildcard character has the following meanings: In telecommunications, a wildcard character is a character that may be substituted for any of a defined subset of all possible characters. Also, A special symbol used in database searching that stands for one or more characters, often an asterisk (*). Example: wom*n will search for woman and women. They are useful when you are unsure of spelling, when there are alternate spellings, or when you only know part of a term.
Wiki
Wiki- A wiki is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor. Also, Wiki software (also known as a wiki engine or wiki application) is software that runs a wiki, or a website that allows users to collaboratively create and edit web pages using a web browser. A wiki system is usually a web application that runs on one or more web servers.
Trademark
Trademark-A Trademark in computer security is a contract between code that verifies security properties of an object and code that requires that an object have certain security properties. As such it is useful in ensuring secure information flow. Also, it is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify that the products or services to consumers with which the trademark appears originate from a unique source, and to distinguish its products or services.
Shared bookmark
Shared bookmark- A shared bookmark is an open source. It has data containing classification information would benefit users who are collaborating in similar research areas. They could open a bookmark shown on a page to find other related topics and follow them for bookmarks to other related documents.
Search engine
Search engine- It is a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet). Also, it is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. The information may consist of web pages, images, information and other types of files.
Related search
Related search-This is like when you go to a website and you ask for something but they dont have that answer or object in the page but, there is one similar to that page and you can find what you need there instead.
public domain
public domain- A public domain is an intellectual property designation for the range of content that is not owned or controlled by anyone. These materials are public property, and available for anyone to use freely (the "right to copy") for any purpose. Also, there is a public domain software.
Wednesday, December 15, 2010
podcatcher
podcatcher-A podcatcher is a software application that automatically checks podcast feeds and automatically download new items
.
.
plagiarism
plagiarism-The act of plagiarizing: the copying of another person's ideas, text, or other creative work, and presenting it as one's own, especially without permission; Text or other work resulting from this act.
phrase searching
phrase searching-Phrase searching refers to the use of inverted commas to force a search tool to find terms in a phrase only. For example: "acquired immune deficiency syndrome". Also, a search process that allows you to combine words so that you only get records where the words are next to each other in the order specified.
peer-to-peer (p2p)
peer-to-peer (p2p)-A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central.
news feed
news feed- It is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it.
math symbols
math symbols- There are the basic symbols we use in math today.This is something you can use in the computer when writting a paper on math or on paper in general.
link list
link list- A link list is either empty (null) or a reference to a node having a reference to a linked list. A node an abstract entity that might hold any kind of data in addition to the node reference that characterizes its role in building linked lists.
libel
libel-A written or pictorial statement which unjustly seeks to damage someone's reputation; The act or crime of displaying such a statement publicly; To defame someone, especially in a manner that meets the legal definition of libel. Also, use of print or pictures to harm someone's reputation.
keywords
keywords-Keywords are the words that are used to reveal the internal structure of an author's reasoning. While they are used primarily for rhetoric, they are also used in a strictly grammatical sense for structural composition, reasoning, and comprehension. Indeed, they are an essential part of any language.
In other words they are the words that you notice various timees in a page or something else.
In other words they are the words that you notice various timees in a page or something else.
Vocabulary words set #4 Indexes
Indexes- Indexes means more than one index but an index is a list of words or phrases ('headings') and associated pointers ('locators') to where useful material relating to that heading can be found in a document.table at the cost of slower writes and increased storage space. In a computer a database index is a data structure that improves the speed of data retrieval operations on a database.
Thursday, December 9, 2010
Secure
Secure- this is when you want to prtect your computer from anybody logining in to it. you secure it with a password.
Subscribe to:
Comments (Atom)
