multitasking
provides process and memory management services that allow two or more tasks, jobs, or
programs to run simultaneously
multithreading
allows multiple parts, or threads, to run simultaneously within a single program
multiprocessing
capability supports a division of labor among all the processing units
memory leak
when an application requests memory but never releases it, can cause an application not to
function properly
Designed for devices such as smartphones and tablets. Mobile OSs support touchscreens, but
tend to limit multitasking and user access to local storage devices.
kernel
Provides essential operating system services, such as memory management and file access. The
kernel stays in RAM all the time your computer is on.
boot process
The sequence of events that occurs between the time that you turn on a computer and the time
that it is ready for your to issue commands.
bootstrap program
Built into special ROM circuitry housed in the computer's system unit. When you turn on a
computer the ROM circuitry power receives power and begins the boot process by executing the
bootstrap program.
user interface
The combination of hardware and software that helps people and computers communicate with
each other.
command-line interface
Originally computers had a ____ that required users to type memorized commands to run
programs and accomplish tasks.
desktop
A visual work area that covers the entire screen and remains in the background throughout a
computing sesion.
taskbar or dock
A desktop includes a ___ or ____ for launching applications.
application windows
Launched applications are displayed here on the desktop which can be resized and repositioned.
start screen
Popular on handheld devices, appears at the end of the boot process whenever it is invoked by
the user, commonly by pressing the Home button. Start screen display icons or tiles for apps, so
that you can select the one you want to use.
icon or tile
Small picture that represents a program, file, or hardware device. Some icons are designed as
tiles, which can display information feeds of live data.
ribbon
Alternative type of menu that is arranged as rows of tools on a succession of tabs. Microsoft
pioneered the ribbon interface element, which was incorporated in the last several editions of
Microsoft Office.
submenu
Additional set of commands that the computer displays after you make a selection from the main
menu. Sometimes a submenu displays after another submenu.
dialog box
Displays the options associated with a command.
Windows RT
Designed as a mobile OS for tablet devices with ARM processors.
Mac OS
Macintosh Operating System, Apple's computer systems. Uses the "dock."
dual boot
Software called Boot Camp is a ____ ____ utility that can switch between Mac OS X or
Windows. To change operating systems, you have to reboot.
virtual machine
Allow you to use one computer to simulate the hardware and software of another. Each virtual
machine has its own simulated processor (or core processor), RAM, video card, input and output
ports, and OS. Each machine can run most software that's compatible with the virtual OS
platform. Popular virtual machine software such as VMware and Parallels Desktop can run on
most computers with Intel microprocessors, including Intel Macs, PCs, and generic Linux
computers
data fork
Similar to files in other operating systems. It contains data, such as the text for a document, the
graphics for a photo, or the commands for a program.
resource fork
Companion file that stores information about the data in the data fork, such as the file type and
the application that created it.
iOS
Operating system for the Apple iPhone, which launched in 2007. Used for the iPod Touch and
iPad. All iOS devices use ARM-based microprocessors.
Android
Mobile operating system that is a popular platform for tablet computers, smartphones, and ebook
readers. It is an open source OS under the project leadership of Google. Designed for ARM
processors.
UNIX
Operating system was developed in 1969 at AT&T's Bell Labs. Dependable in multiuser
environments.
Linux
Operating system distributed along with its source code under the terms of a GPL (General
Public License). A Linux distribution is a download that contains the Linux kernel, system
utilities, graphical user interface, applications, and an installation routine.
Linux distribution
Download that contains the Linux kernel, system utilities, graphical user interface, applications,
and an installation routine. Beginner-friendly Linux distributions include Fedora, Mint, Debian,
openSUSE, and Ubuntu.
Blackberry OS
Is a proprietary operating system produced by RIM. Key feature is the ability to work with
corporate e-mail software systems produced by Microsoft and IBM.
push technology
RIM pioneered push technology, in which notifications are automatically sent to a device.
file-naming conventions
You must adhere to file-naming conventions when saving files:Case sensitivity, Maximum
length, Spaces allowed, Numbers allowed, Characters not allowed, File names not allowed.
file extension
Sometimes referred to as a file name extension; is an optional file identifier that is seperated
from the main file name by a period. Example: paint.exe File extensions provide clues to a file's
contents .exe (Windows) and .app (Mac OS). A file extension does not really define the format of
a file.
reserved words
Used as commands or special identifiers. You cannot use these alone as a file name.
file location
To designate a file's location, you must first specify the device where the file is stored. The main
hard disk usually is referred to as drive C. Macs do not use drive letters.
disk partition
A section of hard disk drive that is treated as a separate storage unit. Partitions can be assigned
drive letters. Partitions are not the same as folders.
directory
Every storage device has a ____ containing a life of its files.
root directory
The main directory is referred to as the root directory. On a a PC, the root directory is identified
by the device letter followed by a backslash. Example: the root directory of the hard disk would
be C:\
subdirectory
A root directory can be subdivided into smaller lists.
folder
When using Windows, Mac, or a Linux graphical file manager, each subdirectory is depicted as a
folder
file format
Refers to the organization and layout of data that is stored in a file. The format of a file usually
includes a header, data, and possibly an end-of-file marker. Example of graphical file formats:
GIF, JPEG, PNG.
file header
Section of data at the beginning of a file that contains information about a file, such as the date it
was created, the date it was last updated, its size, and its file type.
file tag
Describes the file's contents.
metadata
File tags are a type of ____ that describes the contents of a file. This essentially means "data
about data." Describe the data contained in a file.
File Explorer
A utility program bundles with the Windows operating system and designed to help you organize
and manipulate the files stored on your computer. File Explorer helps you manipulate files and
folders in the following ways: Rename, Copy, Move, Delete. Windows offers a set of
preconfigured personal folders, such as My Documents and My Music, for storing your personal
data files.
library
Similar to a folder only in the sense that it can be used to group similar files; however a library
doesn't actually store files. Instead, it contains a set of links to files that are stored on various
devices for systems and in various folders.
disc mastering
Process of creating a CD, DVD, or BD by selecting all the files and then copying them in a
single session. The process can take some time -- especially when burning a full DVD or BD.
packet writing
Recording technology that lets you record in multiple sessions. Example: you can copy a few
files to a CD during one session, and then at a later date record additional files to the same CD.
file system
Keep track of the names and locations of files that reside on a storage medium, such as a hard
disk. NTFS (New Technology File System).
cluster
To speed up the process of storing and retrieving data, a disk drive usually work with a group of
sectors called a ___ or a block.
fragmented files
As a computer writes on a disk, parts of files tend to become scattered all over the disk. These
___ ___ are stored in noncontiguous clusters.
defragmented utility
To regain peak performance, you can use a ___ ___ such as Windows Disk Defragmenter, t
rearrange the files on a disk so that they are stored in contiguous clusters.
backup
Stores the files needed to recover data that's been wiped out by operator error, viruses, or
hardware failures. Your backup schedule depends on how much data you can afford to lose. You
should test your backup by trying to restore one file. The backup device you select depends on
the value of your data, your current equipment, and your budget. A full system backup includes a
copy of every file stored on your computer's hard drive.
restore
Backups allow you to restore data from a backup to the original storage location or to a
replacement device.
file copies
Unique files are difficult to reproduce. Manually copying and pasting requires you to select the
files and destination device each time.
synchronization
Compares the content of files on two devices and makes them the same. Example: a program
called Time Machine supplied with Mac OS X is a good example of synchronization software.
Windows 8 includes a synchronization utility called File History.
boot disk
Is a removable storage medium containing the operating system files needed to boot your
computer without accessing the hard disk.
recovery disk
Is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard
disk as it existed when the computer was new.
recovery partition
Is located on the computer's hard disk and contains the necessary files to restore a computer to its
original state.
Windows Registry
An important group of files used by the Windows operating sytsem to store configuration
information about all the devices and software installed on a computer system.
restore point
A snapshot of your computer settings. Restore points are essentially backups of the Windows
Registry. If a hard disk problem causes system instability, you might be able to roll back to a
restore point when your computer was operational.
backup software
A set of utility programs designed to back up and restore some or all of the files on a computer's
primary storage device. A backup made by copying all the files to a backup device is called a full
backup.
differential backup
makes a backup of only those files that were added or changed since your last full backup
session
incremental backup
makes a backup of the files that were added or changed since the last backupnot necessarily
the files that changed from the last full backup
bare-mental restore
restores the computer in a single step
disk image
a bit-by-bit copy of the data from all sectors of a disk
covers a large geographical area and typically consists of several smaller networks
LAN advantages
-Sharing networked hardware can provide access to a wide range of services and specialized
peripheral devices
LAN disadvantages
-One disadvantage of LANs is that when a network malfunctions, all the resources you're
accustomed to accessing are unavailable until the network is repaired
-LANs are vulnerable to unauthorized access
-LANs are vulnerable to malicious code
shared resources
hardware, software, and data made available for authorized network users to access
node
network-enabled peripheral, is any device that contains network circuitry to directly connect to a
network
network attached storage (NAS)
or network appliance, is any electronic device that broadcasts network data, boosts signals, or
routes data to its destination
router
central distribution point for getting data to its destination; network devices also include hubs,
switches, gateways, bridges, wireless access points, and repeaters
communications channel
composed of many strands of glass tubes that are not much wider than a human hair; data signals
speed through these tubes as rays of light; MANs and WANs use these to carry network signals
bandwith
high-bandwidth communication systems, such as TV and DSL; essential for networks that
support many users, and those that carry lots of audio and video data, such as music and movie
downloads
narrowband
refers to a set of rules for efficiently transmitting data from one network note to another
handshaking
a "parcel" of data that is sent across a computer network; every packet that travels over a network
includes the address of its destination device
circuit switching
establishes a dedicated, private link between one telephone and another for the duration of a call;
this type of switching provides callers with a direct pipeline over which a stream of voice data
can flow; inefficent
packet switching
more efficient than circuit switching; divides a message into several packets that can be routed
independently to their destination; messages divided into equal size pickets are easier to handle
than an assortment of small, medium, large, and huge files
MAC address
.an IP address such as 204.127.129.1 is separated into 4 sections by periods for the convenience
of human readers; each section is called ___ because in binary it is represented by eight bits
DHCP (Dynamic Host Configuration Protocol)
also called Ethernet card or NIC; a USB Ethernet adapter plugs into a USB port and can be used
with a laptop and desktop computers; Ethernet card installs in an expansion slot inside the
system unit of a desktop computer
RF signals
commonly called radio waves; sent and received by a transceiver which is a combination of a
transmitter and a receiver that is equipped with an antenna
microwaves
provide another option for transporting data wirelessly; they are electromagnetic signals
infared light
can carry data signals but only for shot distances and with a clear line of sight
Wireless Basics
-Wireless network technology transports data from one device to another without cables or wires
-Slower than wired networks
-Security concerns
bluetooth
a short-range, wireless network technology designed to make its own connections between two
devices
pairing
creates a persistent link between two devices, usually through the exchange of an authentication
code called a passkey
discovery mode
devices equipped with Bluetooth capability can be set into ___ in which they are open for
pairing; two devices in discovery mode can "discover" each other and exchange passkeys, one
pairing is complete, the two devices can share data without exchanging passkeys again
Wi-Fi
when a router uses both frequencies; offers flexibility to support various network devices and
also can over come interference on either of the bands
MIMO (multiple-input multiple-output)
devices with one or more antennas technology to boost signals and spread them more evenly
over the signal range; routers usually have 1-4 antennas and more antennas generally mean more
coverage area and good speed even as devices get farther from the router
Router Configuration
-Your Internet service provider supplies a device called a modem that is designed to carry data to
and from the Internet
-This device typically has a standard Ethernet port that can be connected to a router
-Most routers supply a WAN port designed for an Internet connection
-Plug a standard network cable into the router's WAN port and connect the other end of the cable
into the Internet modem
Device Connection
-Simply turn on any Windows computer with wireless capability and make sure that it is in range
of your router
-Macs automatically sense available networks and give you the option of connecting to them
-Any device that has Wi-Fi capability should be able to connect to your network
SSID (service set identifier)
scrambles the data transmitted between wireless devices and then unscrambles the data only on
devices that have a valid encryption key
WEP (Wired Equivalent Privacy)
WPA2; offers stronger protection by making sure that packets have not been intercepted or
tampered with in any way
PSK (pre-shared key)
network security key; basis for scrambling and unscrambling the data transmitted between
wireless devices; all workstations use the same key to scramble and unscramble data
file sharing
-allows files containing documents, photos, music, and other data to be accessed from computers
other than the one on which they are stored
-Once your network gives you access to other computers on the network, you can view a list of
files stored there
-when you activate file sharing, files in Public folders can be accessed by other network users
-You also can make specific files shareable
Network Discovery
a setting that affects whether your computer can see other computers on a network, and whether
your computer can be seen by others
public folder
designed to hold files and folders that you want to share with other people on your network
homegroup
collection of trusted Windows computers that automatically share files and folders; access can be
protected by a password
file server
a computer whose primary purpose is to be repository for files that can be accessed by network
workstations; example: an old desktop computer to store lots of big video files
Network Troubleshoothing
transforms a message so that its contents are hidden from unauthorized readers; converting
plaintext into ciphertext
plaintext
an encrypted message
decryption
or simply key; a word, number, or phrase that must be known to encrypt a decrypt a message
weak encryption
easy to decrypt even without the algorithm and key; unauthorized decryptio is sometimes
referred to as breaking or cracking a code
strong encryption
technology used for WPA2; one of the strongest cryptographic algorithms; encryption methods
can be broken by the use of expensive, specialized, code-breaking computers
symmetric key encryption
key used to encrypt s message is also used to decrypt the message; used to encrypt stationary
data such as corporate financial records and data that travels over WLANs
public key encryption (PKE)
eliminates key distribution problem, by using one key to encrypt a message and another key to
decrypt the message; when personal computer users want to encrypt email or other documents,
they turn to public key encryption software such as PGP (Pretty Good Privacy), GnuPG, or
AxCrypt
CHAPTER 6
Always-on connection
A type of FTP access that requires no account on a server, but rather can be accessed using
"anonymous" as the user ID
Asymmetric Internet connection
Any connection to the Internet in which the upstream speed differs from the downstream speed
Asynchronous communications
A communications mode, such as forums, e-mail, blogs, and tweets, in which participating
parties do not have to be online at the same time
BitTorrent
A peer-to-peer technology in which pieces of files are distributed to and from a collection of
networked computers; used for distributing music and movies over the Internet
Blog
(WeB LOG) A publicly-accessible personal journal posted on the Web. Blogs often reflect the
personality of the author and are typically updated daily
Cable Internet service
A communications device that can be used to connect a computer to the Internet via the cable TV
infrastructure
Chat
Communications port
In the context of computer networking, a virtual location for data that arrives or leaves the
device; common ports include 21 for FTP, 110 for e-mail, and 80 for Web data
Dial-up connection
An exploit in which the DNS database is changed in such as way that a URL no longer connects
to the correct Web site
DOCSIS
(Data Over Cable Service Interface Specification) A security technology used for filtering
packets and maintaining customer privacy on cable Internet services
Domain name
Short for "fully qualified domain name"; an identifying name by which host computers on the
Internet are familiarly known (for example, "coca-cola.com").
Domain name server
(DNS) A large database of unique IP addresses that correspond with domain names
Downstream speed
The rate at which transmitted data flows from a host or server to a local computer (contrast with
upstream speed)
DSL
(Digital Subscriber Line) A high-speed Internet connection that uses existing telephone lines,
requiring close proximity to a switching station
DSL filter
Devices that are commonly used to prevent interference from analog devices, such as telephones,
that use the same line as DSL devices
DSL modem
A device that sends and receives digital data to and from computers over telephone lines
Dynamic IP address
Software or hardware designed to analyze and control incoming and outgoing packets on a
network, used to enhance security by filtering out potential intrusion attempts
Fixed Internet access
Any Internet access service designed to be used from a fixed, non-portable location, i. e., dial-up,
ISDN, DSL, and cable Internet service
Fixed wireless Internet service
High-speed, wide area Internet service alternative to cable and DSL that transmits data wirelessly
using RF signals
FTP
(File Transfer Protocol) A set of rules for uploading and downloading files between a client
computer and a remote server
FTP client
The computer or software that is used to access an FTP server and transfer files to it or from it
FTP server
A network of computers harnessed together to perform processing tasks; distributed grids like the
SETI project use ad hoc and diverse Internet connected computers; also see cloud computing
ICANN
(Internet Corporation for Assigned Names and Numbers) A global organization that coordinates
the management of the Internet's domain name system, IP addresses, and protocol parameters
Instant messaging
A private chat in which users can communicate with each other in real time using electronically
transmitted text messages
Internet backbone
The major communications links that form the core of the Internet
Internet forum
(ISP) A company that provides Internet access to businesses, organizations, and individuals
Intrusion
(Internet Protocol) One of the main protocols of TCP/IP; responsible for addressing packets so
that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers
128-bit addresses.
Jitter
Deviations in the timing of a digital signal that can interfere with communications, especially
voice over IP
Latency
The elapsed time it takes for a packet of data to arrive at its destination
MiFi
A small, wireless router that connects to a cellular data network, creating a mobile WiFi hotspot
Mobile broadband
High-bandwidth wireless technology that was developed for sending digital data over cell phone
systems
Any service that allows subscribers to access the Internet while on the go
Modem
A device that modulates and demodulates a signal, typically used to send data from a computer
to the Internet over telephone, cable television, or satellite networks
Network access points
(NAP) Internet nodes that link together different network service providers so that data can be
transferred from one service provider to the other
Network address translation
(NAT) A security technique that allows a LAN to use one type of IP address for intra-network
data and another type of address for data traveling to and from the Internet
Network service providers
A practice in which individuals can obtain music, video, and other types of files from other users
on a network; sometimes the files are shared without authorization from the copyright holder
Packet loss
The situation in which data bits are lost in transit, requiring them to be resent which significantly
increases the time required for an intact message to arrive at its destination
Ping
(Packet INternet Groper) A command on a TCP/IP network that sends a test packet to a specified
IP address and waits for a reply
Port probe
An exploit used by hackers to locate computer ports that can be used for surreptitious access;
also called a port scan
Portable Internet access
Any type of Internet service, such as portable satellite, that can be moved from one place to
another
Private IP address
Technologies, such as instant messaging and chat, that allow people to exchange messages when
they are online
Routable IP address
A network address that can be routed over the Internet; contrast to private IP address
Satellite Internet service
A high-speed Internet service that uses a geosynchronous or low-earth orbit satellite to send data
directly to satellite dishes owned by individuals
Satellite modem
A device that connects a computer to a satellite for purposes of accessing the Internet
Software as a service
A cloud computing model in which consumers access applications using a browser, usually fee
based
Static IP address
Any connection to the Internet in which the upstream speed is the same as the downstream speed
Synchronous communications
A communications mode, such as VoIP, in which participants must be online at the same time
TCP
(Transmission Control Protocol) The protocol within TCP/IP that is responsible for establishing a
data connection between two hosts and breaking data into packets
TCP/IP
(Transmission Control Protocol/Internet Protocol) The primary protocol suite for transmitting
messages over the Internet
Top-level domain
A major domain category into which groups of computers on the Internet are divided, such as
com, edu, gov, int, mil, net, and org
Traceroute
A network utility that records a packet's path, the number of hops, and the time it takes for the
packet to make each hop
Tweet
The rate at which data is transmitted from your home computer to the Internet
Virtual private network
(VPN) A network connection that typically carries encrypted data over the Internet to and from a
remote access server
Voiceband modem
(Voice over Internet Protocol) Hardware, software, and protocols used to make telephone-style
calls over the Internet. Also referred to as Internet telephony.
WAP
(Wireless Access Protocol) A communications protocol that provides Internet access for
handheld devices
Wi-Fi hotspot
The geographical area in which you can connect to a Wi-Fi signal, such as a Wi-Fi equipped
campus or coffeehouse
Wiki
Software that allows users to collaborate to create, change, and link Web pages. Used for
applications such as Wikipedia and open source project management
WiMAX
Fixed wireless Internet service based on Ethernet protocols with a range of 30 miles and a
transmission speed of 70 Mbps
CHAPTER 7
Web
(short for World Wide Web) is a collection of document, image, video, and sound files, that can
be linked and accessed over the Internet using a protocol called HTTP
hypertext
describes a computer that could store literary documents, link them according to logical
relationships, and allow researchers to comment and annotate what they read
Web site
contains a collection of related information organized and formatted so it can be accessed using
software called a browser
Web server
Internet-based computer that accepts requests from browsers. Servers collect the requested
information and transmit it back in a format that the browser can display in the form of a Webpage
Web page
product or output of one or more Web-based files displayed in a format similar to a page in a
book. Web-pages can dynamically incorporate videos, sounds, and interactive elements
Web browser
-or just browser is client software that displays Web page elements and handles links between
pages;
-examples: Internet Explorer, Mozilla Firefox, Google Chrome, Safari
-It is a good idea to upgrade when a new version of your browser becomes available
-If your browser does not have built-in support for a file format required to display or play a Web
page element, you can download the necessary software
-A plug-in is a program that extends a browser's ability to work with file formats
hypertext link
when using a browser, you can access a Web page by clicking a ___ or simply referred to as a
link or by typing a URL
URL
(Hypertext Markup Language) is a set of specifications for creating documents that a browser
can display as a Web page
markup language
HTML is called ___ because authors mark up documents by inserting special instructions called
HTML tags
HTML tags
specify how the document should appear when displayed on a computer screen or printed
HTML 5
markup language very similar to HTML, but can be customized with tags that describe the data
in databases; more rigidly structured and a bit more complex than HTML and must adhere to a
strict set of syntax rules
HTML docuement
HTML tags are incorporated into an ___, which is similar to a word processing file but has an
.htm or .html extension; tags such as <hr /> and <b>, are enclosed in angle brackets and
embedded in the document which the Web page attempts to follow instead of showing the tags or
brackets; example: <img> an image will appear
source docuement
HTML document is sometimes referred to as ___ because it is the source of the HTML tags used
to construct a Web page
HTTP
protocol that works with TCP/IP to get Web resources to your desktop
socket
reuses the same HTTP connection to send and receive multiple requests; today's browsers use
this to obtain text, images, and audio for a Web page during a single session
HTTP status code
or browser history; when your browser fetches pages and graphics to form a Web page, it stores
that material on your computer in temporary files
plug-in
small chunk of data generated by a Web server and stored in a text file on computer's hard disk;
fix problems caused by HTTP's stateless protocol
adds HTML tags to a document, spread-sheet, or other text based file to create an HTML
document that can be displayed by a browser
Web authoring software
or HTML editors; which provide tools specifically designed to enter and format Web page text,
graphics, and links
HTML form
Interactive and dynamic Web sites are possible when programming and scripting technologies
supplement native HTML features
client-side
when the HTML source document that's received by your local browser handles interactions
server-side
or search engine; is a program designed to help people locate information on the Web by
formulating simple queries consisting of one or more words called keywords or search terms
Web crawler
entered into a header section of a Web page when it is created and is supposed to describe the
page contents
Keyword stuffing
unethical practice in which meta keywords are manipulated to gain high relevancy rankings
search engine indexer
software that pulls keywords from a Web page and stores them in an index database
query processor
looks for your search terms in search engine's indexed database and returns a list of relevant Web
sites
Link popularity
measured by quality and quantity of links from one Web page to others
sponsored links
some search engines accept paid ads called ___, which are bumped to the top positions on the
results list
search operator
word or symbol that describes a relationship between search terms and thereby helps you create a
more focused query, examples: and, or, not, " ", *, .. (two dots)
e-commerce
-typically refers to business transactions that are conducted electronically over a computer
network
-e-commerce offers some unique advantages over brick-and-mortar stores and mail-order
catalogs
-easily search for merchandise
-easily compare prices and products
e-commerce business models
C2C
-At C2C auction and online classified advertising e-commerce sites, consumers offer goods and
services to other consumers
-C2C sites are hosted by an e-commerce provider such as eBay or craigslist
-Many C2C sites uses e-mail forwarding to protect participants' privacy
banner ad
overlays the content on a Web page, sometimes obscuring it until you click the ad or its timer
expires and the ad disapears
pop-up ad
advertisement that appears in a separate window when you connect to a Web page.
click-through rate
number of times that site visitors click the ad to connect to the advertiser's site
ad-blocking software
-encrypts the data transmitted between your computer and a Web site
-SSL (Secure Sockets Layer)
-TLS (Transport Layer Security)
-HTTPS (Hypertext Transfer Protocol Secure)
online payment
-The most popular ways to make online payments include submitting your credit card number
directly to a merchant and using a third-party payment service such as PayPal
-Online shoppers are justifiably worried that personal information and credit card numbers
supplied in the course of an e-commerce transaction might be hijacked and used inappropriately
P2P payment
(Hypertext Transfer Protocol Secure); combination of HTTP and SSL/TSL that provides a secure
connection for Web-based transactions
email message
email services
email server
computer than essentially acts as a central post office for a group of people
email account
electronic mailbox
message header
divided into fields that contain the sender's e-mail address, the recipient's address, a subject line,
and the date and time the message was written
email client software
example: imsoamazing@yahoo.com
store and forward
POP3 or IMAP
(Post Office Protocol ver 3) or (Internet Message Access Protocol) are used to manage your
incoming mail; POP3 deletes messages from the server after they are downloaded; IMAP leaves
them until specifically deleted
SMTP
online jargon for Internet etiquette; it is a series of customs or guidelines for maintaining
civilized and effective communications in online discussions and email exchanges
ad serving cookies
claim that the data in their cookies is used simply to select and display ads that might interest you
first party cookie
provides additional ways to surf the Web without accumulating a trail of cookies
Flash cookie
also called a local shared object, is the Flash equivalent of a conventional Web cookie
anonymous proxy service
uses an intermediary, proxy, server to relay Web page request after masking the originating IP
address
Web bug
or clear GIF is typically a 1x1 pixel graphic embedded in a Web page or e-mail message. It is
almost invisible due to its size and is designed to track who's reading the Web page or e-mail
message
antispyware
type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and
other spyware
spam
-unwanted electronic junk mail about medical products, low-cost loans, and fake software
upgrades that arrive in your online mailbox
-spam has turned into another major hacking tool for cybercriminals
spam filter
type of utility software that captures unsolicited e-mail messages before they reach your inbox
Phishing
-e-mail based scam designed to persuade you to reveal confidential information, such as your
bank account number or Social Security number
-If you don't want to become a phishing victim, be suspicious of e-mail messages that
supposedly come from banks, ISPs, online payment services, operating system publishers, and
online merchants
fake sites
fake, or fraudulent, Web site looks legitimate, but has been created by a third party to be a very
clever replica of a legitimate Web site
pharming
-an exploit that redirects users to fake sites by poisoning a domain name server with a false IP
address
-Pharming is more surreptitious and tougher to detect than most other hacker schemes