Small application located on a server; when requested the applet is downloaded to the client.
Gap in levels of internet access & the availability of technical tools in different regions of worlds
*Danger-prevents us from using all the minds on the planet to solve the planets problems.
Where a dedicated connection is formed between 2 points (2 people on telephones) & the connection remaining active for the duration of the transmission
A model a network communication where a client device such as a computer, tablet or smartphone uses browsers to request services from networks that make up the internet.
A way of assigning internet protocol address where a computer is assigned a temporary address from an available pool of address.
In a connection oriented protocol, the process of exchanging control packets before exchanging data packets.
A communication methodology that makes computer communication efficient in packet switching --> data is broken into smaller chunks called packets (SSL)
A way of assigning internet protocol addresses where the address for a computer never changes and is most likely assignment manually by a network administration or an internet service provider
The main suite of protocols used for transmitting data over the internet,, named after "transmission control protocol" & the "Internet protocol"
Set of rules for exchanging electronic info
Slacking using computer for non work, while working & getting paid.
Point of presence
Bank of modems, servers, routers and switches for users to connect to internet provider.
Enable gathering together of groups of people to connect & exchange ideas, and they have brought together groups of people to connect & exchange ideas & they have brought together people facing repression & censorship in many countries.
** provides instant connection & info distribution**
Set of new features functionnality that allowed users to contribute content easily & to be easily connected to eachother
Asking for small donations from a large number of people using the internet
QR- Quick response codes
Let any piece print host a link to online info and video content ad website, video or FB pg for more info about product.
Joining together as a group to use a specific product more efficiently
Checking in w/voice of a crowd- people verdicts on the quality of items.
Electronic junk mail
Study of management & processing of information & the automatic retrieval of info. IT careers work /with computers, telecommunications & software deployment
Searching huge amounts of data w/the hope of finding a pattern.
-The art of translating huge volumes of raw data into presentations like charts & graphs that provide manager w/info on buying trends that enable them to make better decisions.
Internet protocol address- ID each computer & eachother
RSS - Really Simple Syndication
Sends latest content series to an aggregator
Multimedia (graphics, audio & video files)
One or more forms of media in addition to text
Like: Netflix, Hulu, & video demand
Short for electronic commerce. Is the process of conducting business online, guidelines to make online shopping safer, look for indicators that the website is secure. Shop at well known reputable sites, pay by credit card (not debit).
Is software that lets locate, view & navigate the web
URL (uniform resource locator)
Made of many parts
- protocol (http) set of rules used to retrieve document
- Domain name(www.rythmes) path or sub directory* Identifies the sites host
- Top level domain (com)/ if path- each country has its own
- Path of sub directory pages /crosswords
- Subject directory- structured routine of sites organized by topics & subtopics
- Search engine- Set of programs that searches keep words & returns list of sites
- Meta search- search other search engines
Any criminal action perpetrated primarily through the use of a computer
Subtly different than a virus. Don't require human interaction, they take advantage of file transport methods such as email or network connections to spread their own.
Attaches itself the a document that uses macros
macro- short series of commands that usually automates repetitive tasks.
portion of the virus code that's unique to a particular computer virus
Anyone who unlawfully breaks into a computer system, either individual or network
Software that's intended to render a system temporarily or permanently useless, or to penetrate a computer system completely for the purpose of information gathering
Ex., Spyware, viruses, worms & Trojan horses
Planting malicious codes on a computer that alters the browser's ability to find web addresses & that directs users to bogus websites
Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo.
Small text file (some websites automatically store on PC) to collect information.
* So when you log onto a website the cookie file assigns an ID number to your computer to make you return visit to that site more efficient.
A hardware/ software solution that help shield your network from prying eyes.
*Can protect yourself from packet sniffing w/a firewall!*
Internet Corporation for Assigned Names & Numbers= For allocating IP addresses to network administrators & not assigned to other users.
Uniform Resource Locator->
Made of several parts:
- Domain name
- pathway or subdirectory