CS160 Introduction to Information Technology

Final Online Examination

CS120 FINAL EXAM

 NET Frameworks

Ø      The Microsoft NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

Ø      The .NET Framework is a new execution environment for Windows programs. It is available as an optional upgrade for any version of Windows after (but not including) Windows 95. Specifically, it can be added to Windows 98, NT 4.0, Millennium Edition, Windows 2000, and Windows XP.

 ASP - Active Server Pages

Ø      ASP is also an abbreviation for application service provider.

Ø      An Active Server Page (ASP) is an HTML page that includes one or more scripts (small embedded programs) that are processed on a Microsoft Web server before the page is sent to the user. An ASP is somewhat similar to a server-side include or a common gateway interface (CGI) application in that all involve programs that run on the server, usually tailoring a page for the user. Typically, the script in the Web page at the server uses input received as the result of the user's request for the page to access data from a database and then builds or customizes the page on the fly before sending it to the requestor.

 

Access

Ø        Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, Share Point lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool.

Access Privileges

Ø       Access privileges determine which portal objects a user can browse or edit, which objects appear in search results, and which can be added to My Pages and community pages.

Access to each object and document in the portal is controlled through the following access privileges:

Access Privilege

Description

Read

Allows users or groups to see the object.

Select

Allows users or groups to add the object to other objects. For example, it allows users to add portlets to their My Pages, add users to groups, or associate remote servers with web services.

Edit

Allows users or groups to modify the object.

Admin

Allows users or groups full administrative control of the object, including deleting the object or approving it for migration.

Active Hyperlink

Ø      A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

 

IT Resource Administrator

 

Ø        Institutional staff that, under the direction of the IT Resource Steward and with operational instructions from the IT Resource Custodian, have day-to-day operational responsibility for data capture, maintenance and dissemination.

 

Authentication

 

Ø      The process of identifying an individual usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.

Database administrator (DBA)

Ø      Is a person who is responsible for the environmental aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database designs are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.

Electronic commerce

Ø      A new area of trade involves goods crossing borders electronically. Broadly speaking, this is the production, advertising, sale and distribution of products via telecommunications networks. The most obvious examples of products distributed electronically are books, music and videos transmitted down telephone lines or through the Internet.

Ø      E-commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business, are often used interchangeably.

 E-Government

 

Ø      (Short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government

Ø      E-Government (from electronic government, also known as e-gov, digital government, online government or in a certain context transformational government ) refers to the use of internet technology as a platform for exchanging information, providing services and transacting with citizens, businesses, and other arms of government. E-Government may be applied by the legislature, judiciary, or administration, in order to improve internal efficiency, the delivery of public services, or processes of democratic governance. The primary delivery models are Government-to-Citizen or Government-to-Customer (G2C), Government-to-Business (G2B) and Government-to-Government (G2G) & Government-to-Employees (G2E).

Encryption

Ø      Is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that re-arranges the data bits in digital signals.

 

Information technology (IT),

Ø      as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Information Technology Resource (IT Resource)

 

Ø        A resource used for electronic storage, processing or transmitting of any data or information, as well as the data or information itself. This definition includes but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related electronic equipment that electronically stores such communications.

 

Intellectual property rights (IPR)

 

Ø      Legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

 

 

ISO

Ø      Short for International Organization for Standardization. Note that ISO is not an acronym; instead, the name derives from the greek word iso, which means equal. Founded in 1946, ISO is an international organization composed of national standards bodies from over 75 countries. For example, ANSI (American National Standards Institute) is a member of ISO. ISO has defined a number of important computer standards, the most significant of which is perhaps OSI (Open Systems Interconnection), a standardized architecture for designing networks

Malicious Code

Ø      Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.

Ø      Malicious Code is a new kind of threat which cannot be blocked by anti-virus software alone. In contrast to viruses (which require a user to execute a program in order to cause damage), malicious code is an auto-executable application. It can take the form of Java Applets, ActiveX controls, plug-ins, pushed content, scripting languages, or a number of new programming languages designed to enhance Web pages and email.

 

 Malware

 

Ø        A portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Ø      Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia

Ø      Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.

 Patch

Ø      A patch is a small piece of software designed to fix problems with or update a computer program or its supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems (see software regressions).

Personal IT Resources

Purge

Ø      To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible to regain deleted objects by un deleting them, but purged objects are gone forever.

 

Remote Access

 

Ø      Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are traveling may need access to the corporation's network. Home users get access to the Internet through remote access to an Internet service provider (ISP).

 

Social Engineering

 

Ø      A term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game".

 

Spoofing

 

Ø      The creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.

Strong Encryption

Ø      An encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.

User ID

Ø      Short for User Identification and is also referred to as username. A User ID is a unique, sequence of characters used to identify a user of Cascade Server. User IDs are used to authenticate the user upon login and for identifying the user for the purposes of logging, access, and resource management. Usernames are chosen upon user creation, and may consist of numbers, letters, and the underscore ( _ ).

 

 

 

Home | About Our School | Programs | Links | Final Online Examination | Contact Us

Enter supporting content here

mylindapalo@yahoo.com