CS 160 - Introduction to Information Technology

Final online Exam

Home
About Our School
Programs
Links
Contact Us
Final online Exam

.NET Frameworks
           s a software framework available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
 
 
ASP - Active Server Pages
      also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server
 
 
Access
     is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.
 
 
Access Privileges
     requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user or a program on the basis of the layer we are considering) must be able to access only such information and resources that are necessary to its legitimate purpose.
 
 
Active Hyperlink  
     A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

retrieved from:  http://webopedia.internet.com/TERM/A/active_hyperlink.html

Administrator (as an IT resource)

    

Authentication

     is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.

retrieved from:  http://en.wikipedia.org/wiki/Authentication

Data Administrator

     is a person who is responsible for the environmental aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database design are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.

retrived from:  http://en.wikipedia.org/wiki/Database_administrator

Electronic Commerce

     commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

retrieved from:  http://en.wikipedia.org/wiki/Electronic_commerce

Electronic Government (eGovernment)

     (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.

retrieved from:  http://en.wikipedia.org/wiki/E-Government

Encryption

     is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

retrieved from:  http://en.wikipedia.org/wiki/Encryption

Information Technology

     as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."  IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

retrieved from:  http://en.wikipedia.org/wiki/Information_technology

 Information Technology Resource (IT Resource)

     A resource used for electronic storage, processing or transmitting of any data or information, as well as the data or information itself. This definition includes but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related electronic equipment that electronically stores such communications.

retrieved from: http://www.utahsbr.edu/policy/r345.htm

Intellectual property rights (IPR) 

     are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

retrieved from: http://en.wikipedia.org/wiki/Intellectual_property

ISO  

     ISO is the world's leading developer of International Standards with a current portfolio of more than 17 800. In recent years, ISO has largely moved from paper-based processes for the development of standards to electronic ones. This system now covers an array of diversified electronic and Web-based operations including the ISO Web site, servers for accessing and exchanging information, an electronic balloting system and a Web store.

retrieved from:  http://www.iso.org/iso/pressrelease.htm?refid=Ref1200 

Malicious Code

       is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.

retrieved from:  http://www.aladdin.com/csrt/malicious-code.aspx

Malware (virus) Detection Software

      a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

retrieved from:  http://en.wikipedia.org/wiki/Malware

Patch

     is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.

reterieved from:  http://en.wikipedia.org/wiki/Patch_(Unix)

Personal IT Resources

    

Purge

       is the removal of people who are considered undesirable by those in power from a government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known as rehabilitation.

retrieved from: http://en.wikipedia.org/wiki/Purge

Remote Access

     Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.

retrieved from: http://en.wikipedia.org/wiki/Remote_access

Social Engineering

     is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.

retrieved from:  http://en.wikipedia.org/wiki/Social_engineering_(computer_security)

Spoofing

     is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

retrieved from:  http://en.wikipedia.org/wiki/Spoofing_attack

Strong Encryption

    

UserID

     users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range of its values varies amongst different systems; at the very least, a UID is a 15-bit integer, ranging between 0 and 32767, with the following restrictions:

  • The superuser must always have a UID of zero (0).
  • The user "nobody" was traditionally assigned the largest possible UID (as the opposite of the Superuser), 32767. More recently, the user is assigned a UID in the system range (1–100, see below) or between 65530–65535.
  • UIDs from 1 to 100 are otherwise reserved for system use by convention; some manuals recommend that UIDs from 101 to 499 (RedHat) or even 999 (Debian) be reserved as well.

retrieved from:  http://en.wikipedia.org/wiki/User_identifier_(Unix)

Enter supporting content here