Академический Документы
Профессиональный Документы
Культура Документы
3. Internet backbone – network service providers such as: AT&T and Sprint
ii. -IP – lower layer; handles the address part of each packet so
that it get to the right destination
6. -Internet speeds:
a. Dial-up
c. Cable access
d. Satellite access
8. -Hyperlinks (links) – words and images that bring other documents into view
when clicked.
11.-Plug-ins – software programs that allow you to derive the full benefits of a
web site like sound or video
15.-Browsing web:
c. -Click a hyperlink
17.-Subject guide – grouping web pages under headings like news or travel
18.-Search engines – index databases of Web pages to enable fast information
searches.
iii. -Wildcards – symbols like * and ? that take the place of zeros or
others
d. -Web beacons – alert the sender that the message has been opened
c. Categorized by:
25.-File Transfser Protocol – method used to transfer files over the internet
CH 9
-Privacy – individuals ability to restrict or eliminate the collection, use, and sale
of confidential personal information
-Spear phishing – also uses fake emails and social engineering to trick
recipients into providing personal information to enable identity theft
-Spyware – software that collects your personal info, monitors your web
surfing habits, and distributes this info to a third party, often leading to
identity theft
-Keyloggers – can record all the keystrokes you type – like passwords,
account numbers, or conversations
-Disk killer – virus that wipes out all the data on your hard drive
-Spim – spam of IM
-Time bomb (logic bomb) – virus that sits harmlessly on a system until
a certain event or set of circumstances causes the program to become
active
-Individual computers are called zombies b/c they do what the DoS
program tells it to
-Password guessing
-Shoulder surfing
Superstar status
-Salami shaving – subtracts very small amounts of money from an account and
diverts money to shaver’s account
-Forgery – making internet data appear to come form one place when it is
actually coming from another
-Crackers (black hats) – hackers who become obsessed with gaining entry to
highly secure computer systems