Glossary+of+Tech+Terms

Glossary of Tech Terms Glossary of Tech Terms 1. Http(s) HyperText Transfer Protocol (s) 2. Ftp File Transfer Protocol Used for downloading files from internet 3. Teleworking The use of a work environment that is not physical such as online. Employment at home while communicating with the workplace by phone or fax or modem 4. SIM Subscriber Identity Module used in cell phones 5. URL Uniform Resource Locator An address that identifies a particular file on the Internet, usually consisting of the protocol, as http, followed by the domain name. 6. Phishing the practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization's logo, in an attempt to steal passwords, financial or personal information, or introduce a virus attack; the creation of a Web site replica for fooling unsuspecting Internet users into submitting personal or financial information or passwords 7. Cookies A small piece of information you may be asked to accept when connecting to certain servers via a web browser. It is used throughout your session as a means of identifying you. A cookie is specific to, and sent only to the server that generated it 8. Protocol A set of rules governing the format of messages that are exchanged between computers. Examples includes Http and Ftp 9. Biometrics Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. 10. HTML Hypertext Markup Language A language used for editing files on the internet.



** 12. Operating system (OS) ** -A program that manages the files in a computer, controls internal or connected devices (peripherals), and runs other selected programs. Abbreviated OS ** 13. Boot Sector ** -A boot sector (sometimes called a bootblock) is a sector of a hard disk , floppy disk, or similar data storage device that contains code for booting programs (usually, but not necessarily, operating systems) stored in other parts of the disk. ** 14. Podcast- ** a Web-based audio broadcast via an RSS feed, accessed by subscription over the Internet automatic installments are updated to the subscriber ** 15. ****Blog ****- ** an online diary that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer ** 16. Vlog- ** A “video blog” often on video sharing websites such as youtube and includes a ranting of a video user. ** 17. ** **Ethernet **- An internet connection that is used mainly by big name corporations; a network cable ** 19 Zombie **. A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch [|DoS attacks] . The hacker sends commands to the zombie through an open port. On command, the zombie computer sends an enormous amount of packets of useless information to a targeted Web site in order to clog the site's routers and keep legitimate users from gaining access to the site.
 * 11. Data mining ** is the process of sorting through large amounts of data and picking out relevant information. It is usually used by business intelligence organizations, and financial analysts, but is increasingly being used in the sciences to extract information from the enormous data sets generated by modern experimental and observational methods. important in getting accurate results. Doing this experiment in a quiet may have given better results. 
 * 18. Encryption- ** The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to <span style="font-family: Calibri; mso-bidi-font-style: italic; msobidifontfamily: 'Times New Roman'; msobidifontstyle: italic; msofareastfontfamily: 'Times New Roman';">decrypt <span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; mso-fareast-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman';"> it. Unencrypted data is called <span style="font-family: Calibri; mso-bidi-font-style: italic; msobidifontfamily: 'Times New Roman'; msobidifontstyle: italic; msofareastfontfamily: 'Times New Roman';">plain tex <span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; mso-fareast-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman';">t <span style="font-family: Calibri; mso-bidi-font-style: italic; msobidifontfamily: 'Times New Roman'; msobidifontstyle: italic; msofareastfontfamily: 'Times New Roman';">; <span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; mso-fareast-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman';"> encrypted data is referred to as <span style="font-family: Calibri; mso-bidi-font-style: italic; msobidifontfamily: 'Times New Roman'; msobidifontstyle: italic; msofareastfontfamily: 'Times New Roman';">cipher text <span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; mso-fareast-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman';">.
 * <span style="font-family: 'Calibri','sans-serif'; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">20. Efencing **<span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman';">: a crime committed on eBay and on other online trading sites where stolen goods are sold

Jaws Program is software that allows blind people to "read" websites by having a automatic voice read it for them. It uses glasses that trces eyes movement.

LAN- stands for Local Area Network

Public network-this network is shared by the public. It is not designed to replace private networks, but rather to augment them in public areas for applications which are appropriate to shared networks.

Shareware- Software that is ditributed without payment and are limited

Freeware- Software that is not limited, it is priced optionally and can usually be downloaded through the internet

Piracy- illegal distribution of information such as movie and music

Packet- a basic unit of communication over a digital network

Communication Protocol- this is a set of rules which oversees data representation

PDF- Portable Document Format

Built in obseclescence is when companies purposely make electronics that will break easily so that they will earn a trust with the customers as a valued company with out losing them


 * <span style="font-family: 'Calibri','sans-serif'; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">Effencing: **<span style="font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; msobidifontfamily: 'Times New Roman';"> a crime committed on eBay and on other online trading sites where stolen goods are sold


 * Caching proxy** speeds up service by obtaining stored data from previous request