cis 120 test 2

Card Set Information

cis 120 test 2
2015-10-22 21:02:45
cis 120 test 2
Show Answers:

  1. The internet lets you access and exchange information via electronic maul (email), online newgroups, file transfer, and the linked documents of the world wide web, better known as the web.
  2. a website
    is a collection of web pages that have a common theme or focus, such as all pages containing information about the library of congress.
  3. search engine
    a program that conducts searches to retrieve web pages.
  4. cloud computing
    refers to providing and using computer tools, such as software, via the internet or the cloud
  5. web app
    the software and data for the maps are not stored on your computer. They’re on the cloud at the mapping service’s web site.
  6. internet service provider (ISP)
    a company that sells internet access
  7. Hypertext transfer protocol –
    the most common way to transfer information around the web.
  8. protocol
    a standardized procedure computers use to exchange information
  9. www indicates that the server is a web server, .gov means that a government entity runs the web server. .com means commercial, .net (network server providers or resources, .org (non-for-profit organizations), .edu (educational institutions)
  10. IP address
    unique number that consists of four sets of number from 0 to 255, separated by periods
  11. Domain name
    identifies one or more IP address, such as URLs use the domain name in the server address part of the URL to identify a particular web site.
  12. The pathname in a URL includes the names of folders containing the file, the filename, and its extension.
  13. Compatibility view
    displays the page as it would appear in an earlier version of internet explorer.
  14. To open a new tab,
    you can press the Crtl key as you click a link on a web page, or you can right-click the link and then click open link in a new tab on the shortcut menu.
  15. When you find a web site that you’ll return to often, you can pin the site to the start screen.
  16. Pinning a site places a tile for the site on the start screen and in the browser.
  17. The major difference between the two versions is the interface. IE windows 8 is designed for touch browsing, while IE desktop is designed for using a pointing device, such as a mouse. IE desktop features more controls and smaller buttons because you can make more precise selections with a pointer than you can with a fingertip.
  18. Command bar
    contains buttons that you can click to perform common tasks, such as displaying the home page and printing a web page
  19. status bar
    shows information about the browser's actions; for example, indicates that a page is loading or is done loading
  20. tab
    displays each web page you open, letting you switch from one web page to another
  21. tools button
    lets you display a menu of options for working with IE desktop
  22. web page area
    shows the current web page
  23. history list
    the list of visited web pages
  24. when you use IE desktop, you can save the location of your favorite web pages in the favorites list, a collection of links to the web pages that you visit often
  25. RSS feed (or feed for short)
    is frequently updated website content, such as news or commentary, delivered directly to your computing device when you are connected to the internet
  26. accelerators
    tools that make it easier to find information on the web without navigating to other web sites
  27. sometimes, web pages include a printer-friendly format link or other similar link for printing a web page, indicating that the web site formats the page for a standard size sheet of paper before printing
  28. to save a web page as a file on your computer, click the page button on the command bar, and then click save as.
  29. webpage, complete
    saves all files associated with the page, including graphics, frames, and style sheets in their original format.
  30. web archive, single file
    saves all information as a single file
  31. webpage, HTML only
    saves only the current page without graphics or other media files
  32. text file
    saves only the text on the current page
  33. email server
    when you send a message, it travels from your computer, through a network, and arrives at a computer called this.
  34. store-and-forward technology
    email uses this. this means you can send messages to anyone on the internet or a network, even if a recipient's computer isn't turned on.
  35. username or user ID
    the name entered when your email account is set up
  36. hotmail
    microsoft offers hotmail as a free web-based email service
  37. to send an email message to many people, you could type more than one email address in the To or Cc text boxes. separate each address with a comma or semicolon.
  38. mail also checks for received email when you click the sync button on the apps bar.
  39. when you delete a message, it moves to the deleted items folder. messages remain in the deleted items folder until you delete that folder's contents.
  40. when emailing: be concise and direct; include your response first; don't email sensitive or confidential information; avoid abbreviations; don't use all capital letters; pause and reread before sending.
  41. calendar actually includes more than one calendar. the main calendar displays your user name and is designed for scheduling all of your appointments and events. other calendars include birthday, personal, holidays, and work.
  42. harmful software (malicious software or malware)
    includes viruses. copies itself and triggers computer code. can infect your computer. can damage your computer by deleting files.
  43. viruses are often spread by email and run when you open an email attachment or the email message itself.
  44. hackers
    people who create and send malware
  45. crackers (black hat hackers)
    hackers with criminal intent
  46. hackers sometimes access your computer using spyware, software that secretly gathers information about you and your computer actions, including sensitive information
  47. the fist place to go to secure your computer is the action center, a control panel tool that helps you manage security from a single window.
  48. if you do not have antivirus software, windows defender runs automatically to defend your computer against malware.
  49. windows firewall
    software that serves as a barrier between your computer and a network or the internet.
  50. windows firewall checks information coming from the network or the internet and either blocks it from your computer or allows it to pass, depending on your settings. in this way, windows firewall prevents unauthorized users from accessing your computer and is the first line of defend against malware.
  51. a firewall defends against malware trying to gain access to your computer by monitoring your network and internet connections.
  52. firewall does not scan email, so it cannot detect viruses sent in email messages (a common way to spread viruses). neither can a firewall detect viruses in files you download from the web.
  53. firewall can't protect you from email scams, called phishing, that try to deceive you into revealing private information such as passwords
  54. service pack (SP)
    when microsoft combines many updates in one package
  55. if an update is available, windows update can download the software and install it for you.
  56. important updates are those you should install to maintain the security and reliability of windows. recommended updates usually enhances your computing experience and repair problems that are not considered critical.
  57. antivirus software
    your best protection against malware. scans email messages, attachments, and other files on your computer for viruses, worms, and other types of malware.
  58. antivirus software locates a virus by comparing identifying characteristics of the files on your computer to the characteristics of a list of known viruses
  59. virus definitions
    a list of the characteristics of known viruses
  60. worm
    a harmful compujter code that spreads without your interactions
  61. trojan horse.
    type of malware that hides inside another program, such as a photo-viewing program you download from the web.
  62. spyware can install itself or run on your computer without your consent or control.
  63. it's called spyware because it monitors your computing actions, usually while you are online, to collect info about you. spyware can change system settings, interrupt programs, and slow your computer's performance. spyware may infect your computer when you visit a certain web site or download a free program.
  64. adware
    a special type of spyware that changes your browser settings to open pop-up ads
  65. pop-up ads
    windows that appear while you are viewing a web page and advertise a product or service. a pop up ad interrupts your online activites and can be difficult to close; they can also be used as vehicles for additional spyware or other types of malware
  66. new toolbars, links, or favorites appear in your web browser unexpectedly. your home page, mouse pointer, or search program changes w/o your consent. result of pop-up ads
  67. pop-up ads interrupt you, even when you're not on the internet.
  68. windows defender
    checks for both spyware and viruses. helps prevent malware from installing itself and running on your computer, and it periodically scans your computer to detect and remove malware. you need to keep malware definitions in the antimalware up to date. windows defender refers to the definitions to determine if software it detects is a virus or spyware.
  69. quarantined
    means windows defender moved them to another location on your computer to safely segregate them from other files. quarantined files cannot run, so they cannot harm your computer.
  70. spam (junk mail)
    an annoying and potentially dangerous type of privacy invasion. sends messages offering products and services that are sometimes fake or misleading. spam can be a vehicle for malware
  71. email is the most common way for computer viruses to spread
  72. email relay
    when spammers take advantage of your vulnerabilities in your computer and use it to send spam to other computers without your permission
  73. phishing
    is an attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a web site. usually starts with an email message that looks like an office notice from a trusted person or business. asks for sensitive information
  74. mail automatically blocks email attachments that might be harmful, such as files with .exe, .bat, and ,js filename extensions.
  75. smartscreen filter also helps detect and block unknown and potentially malicious programs in files that you download from web sites.
  76. digital signatures
    internet explorer can detect and display digital signatures. they are electronic security marks added to files to verify their authenticity
  77. spoofed web site
    a fraudulent site posing as a legitimate one
  78. commonly spoofed web sites are those where you perform financial transactions, such as online banking or shopping sites.
  79. certificate
    a digital document (similar to a digital signature) that verifies the security of a web site you visit
  80. the color of the address bar also indicates the type of error or problem. red means the certificate is out of date, is invalid, or has an error. yellow signals that the ceritifcate cannot be verified, which sometimes happens with a suspected phishing site. white means the certificate is normal, and green indicates sites that have high security
  81. script
    a programming code that performs a series of commands and can be embedded in a web page.
  82. hackers use scripts on a web page to automatically download programs to your computer that can collect and transmit information about you without your knowledge or authorization
  83. pop-up ad
    a small web browser that appears when you visit a web site and advertise a product or service
  84. add-on
    a program offered by any software vendor that provides enhancements, such as a toolbar or an improved search feature.
  85. cookie
    a small file that records information about you, such as the type of browser you are using, your email address, and your preferences for using a website.
  86. cookies can enhance your online experience by helping trusted web sites customize their service to you. however, they can also pose a security risk - hackers can retrieve cookies to search for private information, such as passwords, or use cookies to track the web sites you visit.
  87. you can delete cookies by clearing your browsing history
  88. inprivate browsing
    used to keep information about your web browsing private. this feature prevents internet explorer from storing data about your browsing session.
  89. web beacons
    transparent images that invisibly track web site usage. web analysis tools often contain scripts that can track information such as the pages you visit and the selections you make.
  90. user account
    a collection of information that indicates the files and folders you can access. the types of changes you can make to the computer, and your preferred appearance sttings, such as your desktop background or color scheme
  91. microsoft account
    this type of account provides access to microsft cloud computing services, such as for email, skydrive for file storage, and xboxlive for games.
  92. guest account
    used if someone needs temporary access to a computer. built-in account that is inactive by default. the guest account user cannot make any changes to settings or software.
  93. user account
    a collection of information that indicates the files and folders you can access, the types of changes you can make to the computer, and your preferred appearance settings.
  94. user account control (UAC)
    used to manage access to your computer. it is a feature that is turned on by default and can help prevent unauthorized changes to your computer.
  95. unified extensible firmware interface (UEFI)
    when you turn on the power to a computer, it performs a series of steps and checks as it loads the operating system and prepares for you to use it.
  96. booting
    the startup process of a computer. UEFI boots a computer faster and in a more secure way than previous methods.
  97. secure boot
    makes windows 8 resistant to rootkit malware. it can detect when a file has interfered with the operating system and prevent that file from loading so it doesn't interfere with the operating system again,
  98. windows 8 detects any tampering with the antivirus software and restores the unmodified version so it protects against malware.
  99. search hints
    suggested words and phrases that begin with the letters you typed and have used previously as search text
  100. filename
    basic search. all or part of the filename. what to find: file named April sales.docx. search criterion: apr or fales
  101. file type
    basic search. filename extension. what to find: all of your photos. search criterion: jpg.
  102. contents
    basic search. text the file contains. what to find: file that uses "baseball card sets" as a heading. search criterion: baseball card sets.
  103. date
    advanced searches. date the file was modified, created, or accessed. what to find: document edited on May 15, 2016. search criterion: datemodified:5/15/2016
  104. size
    advanced searches. size of the file. what to find: files larger than 3 MB. search criterion: size>3MB.
  105. tag
    advanced search. word or phrase in the file properties. what to find: photo with "winter," "vacation," and "ski" as tags. search criterion: tag:winter vacation ski
  106. author
    advanced search. name of the person who created the file. what to find: document that Jay created. search criterion: author:Jay
  107. wildcard
    a symbol that stands for one or more unspecified characters in the search criterion. ex (*.jpg)
  108. to conduct an advanced search
    enter the file property name, a colon, and the criterion directly in the text box on the search menu.
  109. windows saves the search in the searches folder. which you can open from the favorites list of any folder window's navigation pane.
  110. file tag
    one of the most useful properties when searching for files. one or more descriptive words you store with a file to help identify its purpose or contents,.
  111. properties
    characteristics of files, such as names and sizes.
  112. other properties include tags, ratings, titles, and authors.
  113. you can add a tag by using the save as dialog box when you save the file or by using the details pane or the file's properties dialog box after you save the file. to use the details pane, you select the file, click the tags text box in the details pane, and then type a word or phrase that will help you find the file later. to add more than one tag, separate each word or phrase with a semicolon (;). for example, if you have a photo of yourself on the peak of the blackrock mountain in virginia, you can use Blackrock; mountain; Virginia as tags,
  114. search using file properties as search criteria. name (name:city), date modified (DateModified:10/28/2016), date created (DateCreated:>10/28/2016), size (Size:200KB), type (type:docx), tags (tag:Chicago), authors (Author:Jay), artisits (Artist:Elvis), rating (Rating:4 stars)
  115. boolean filters
    filters that let you search for specific information using words AND, OR, and NOT to combine search criteria.
  116. examples of combing search criteria. AND (donations AND 2016), OR (donations OR 2016), NOT (donatins NOT 2016), " " ("donations 2016" - exact phrase), ( ) ((donations 2016) next to each other in any order.)
  117. web site designers and owners can make their web pages easier for search providers to find by optimizing the site.
  118. one way to modify your search expression is to use quotation marks to search for specific phrases. if you enclose a phrase in quotes, you restrict the results to web pages that contain that exact phrase.
  119. the ' - ' is used to exclude items from a search. for eample, the -chicago in the search expression is a shorthand way of excluding chicago from the search