CS160 Introduction to Information Technology

Final OnLine Exam

Home
Final OnLine Exam
About Our School
Programs
Links
Contact Us

Enter subhead content here

NET Frameworks
     The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
 
ASP - Active Server Pages
     also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages.
 
Access
     is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools.
 
Access Privileges
     In information security, computer science, and other fields, the principle of least privilege, also known as the principle of minimal privilege or just least privilege, requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user or a program on the basis of the layer we are considering) must be able to access only such information and resources that are necessary to its legitimate purpose.
 
Active Hyperlink
     A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink.
 
Administrator (as an IT resource)
     IT Resource Management allows organizations to analyze, monitor and anticipate the utilization and performance of the IT infrastructure by providing an enterprisewide view of IT services and resources.
 
Authentication
     is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
 
Data Administrator
     The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases.
 
Electronic Commerce
      consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
 
Electronic Government (eGovernment)
     also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government
 
Encryption
      encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext).
 
Information Technology
      as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.
 
Information Technology Resource (IT Resource)
     A resource used for electronic storage, processing or transmitting of any data or information, as well as the data or information itself.
 
Intellectual property rights (IPR)
     are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.
 
ISO
     An ISO image is an archive file (also known as a disk image) of an optical disc in a format defined by the International Organization for Standardization (ISO). This format is supported by many software vendors.
 
Malicious Code
     Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone.
 
Malware (virus) Detection Software
     Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code
 
Patch
     is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments.
 
Purge
     Purge is the sequel to the Future vs. Fantasy total conversion mod for Quake.[Purge is set place in a world where magic fights against technology.
 
Remote Access
     Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).
 
Social Engineering
     is a concept in political science that refers to efforts to influence popular attitudes and social behavior on a large scale, whether by governments or private groups. In the political arena the counterpart of social engineering is political engineering.
 
Spoofing
     is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
 
Strong Encryption
     Encryption is the process of changing data into a form that can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper decryption key (password).
 
 UserID
     On Unix-like operating systems, users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range of its values varies amongst different systems; at the very least, a UID is a 15-bit integer, ranging between 0 and 32767.

Enter supporting content here

greycee_06@yahoo.com