CS 160 Introduction to Information Technology

Final Online Examination

Home | About Our School | Programs | Links | Final Online Examination | Contact Us

Information Technology Terms:

1.  NET Framework

The NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

2.  Active Server Pages (ASP)

It is also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).

Developing rich functionality in ASP websites is enabled by the active scripting engine's support of the Component Object Model (COM), with each object providing a related group of frequently-used functions and data attributes. In ASP 2.0 there were six built-in objects: Application, ASP Error, Request, Response, Server, and Session. Session, for example, is a cookie-based session object that maintains the state of variables from page to page. Functionality is further extended by objects which, when instantiated, provide access to the environment of the web server; as an example File System Object (FSO) is used to create, read, update and delete files.

3.  Access

Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.

Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, Share Point lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool.

4.  Access privileges

Component access privileges define the actions you can perform on components. By default, you are granted the highest level of access, Manage, on any component you create. The Action column of the Oracle Portal Navigator indicates the actions you can perform on the component.

To build a component, you must have Edit or higher privileges in a provider that will own the finished component. The component by default inherits privileges from the provider. For example, after a component is created in MY_APP, all Oracle Portal developers with Execute or higher access privileges on MY_APP can run the component. Component owners can override these privileges and set access on a user by user level rather than the provider level.

5.  Active Hyperlink

A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

6.   Administrator

 

7.  Authentication

Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.

8.   Data Administrator

A database administrator (DBA) is a person who is responsible for the environmental aspects of a database. The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database designs are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.

Data administrator is a person who coordinates activities within the data administration department?  It is same as "database analyst."

 

9.  Electronic commerce

Electronic commerce commonly known as e-commerce or eCommerce consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

A large percentage of electronic commerce is conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.

Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.

10.  E-governance 

A definition that covers every aspect of government.

This is a broad definition covering the different aspects of relations between the state and civil society. The Council of Europe is currently considering a recommendation which will offer a common vision of how digital technology can be incorporated into exercise of power. Aware of the risks entailed in these technologies, the Council reaffirms the need to strengthen democratic institutions and processes and to involve the public in political choices so that their needs and priorities are respected. In this connection, governments must ensure that they involve the whole population, in particular by ensuring that the largest possible numbers of citizens are educated in the use of computers.

11.  Encryption

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now used in protecting information within many kinds of civilian systems, such as computers, storage devices (e.g. USB flash drives), networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encryption is also used in digital rights management to prevent unauthorized use or reproduction of copyrighted material and in software also to protect against reverse engineering.

12.     Information technology

IT as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.

13.  Information technology resources

Information technology resources include, but are not limited to, all university-owned computers, applications software, systems software, databases, and peripheral equipment; the data communications infrastructure; the voice communications infrastructure; UB voice or data network traffic, including traffic entering and leaving the University network; classroom technologies; communication services and devices, including electronic mail, voice mail, modems, and multimedia equipment. The components may be stand-alone or networked and may be single-user or multi-user systems. Some university computing resources are reserved or dedicated to specific functions that may limit their use by the general UB community. Personal devices used to access University of Baltimore Information Technology resources are subject to this policy.

 

14.         Intellectual property Rights

Intellectual property Rights (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly. While credited with significant contributions to modern economic growth, some have criticized the expansion in nature and scope of IP laws.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept.

15. I.S.O.

            An ISO image is an archive file (also known as a disk image) of an optical disc in a format defined by the International Organization for Standardization (ISO). This format is supported by many software vendors. ISO image files typically have a file extension of .ISO but Mac OS X ISO images often have the extension .CDR. The name ISO is taken from the ISO 9660 file system used with CD-ROM media, but an ISO image can also contain UDF file system because UDF is backward-compatible with ISO 9660.

16.  Malicious Code

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.

 17.  Malware (virus) Detection Software

 

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.

18.  Patch

Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.

19.  Personal IT Resources

 

20. Purge

In history and political science, a purge is the removal of people who are considered undesirable by those in power from a government, from another organization, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known as rehabilitation.

21. Remote Access

In telecommunication, the term remote access has the following meanings:

  1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
  2. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
  3. Remote Access is also the name of a DOS-based BBS software.

Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).

Note: For remote access, individual authorization codes are usually required.

22.  Social engineering

In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Appeal to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques.

23.  Spoofing

 

Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.

A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.

24.   Strong Encryption

 

25.  User Identification Device

User Identification Device is a unique name given to a user for accepting a computer system, database, mailbox, etc. Coupled with a password, it provides a minimal level of security.  It is also called username.

 

mazayraparan@yahoo.com