Security
Virtual Property
Data
Network
Online Services
100

Software installed to give pop-ups and track your searching information.

Adware

100
Stealing Software that normally requires a License

Piracy

100

8 bit equals this 

Byte

100

A set of rules responsible for disassembling, delivering, and reassembling packets over the internet (IP stands for)

Internet Protocol

100

a computer program that searches the world wide web

Search Engine

200

A Attacker uses this to get into a part of a Website, Software, or Database to bypass security

Back Door
200

A document that provides the owner the sole right of an invention

Patent

200

A person, place, or thing that has interest to the user

Entity 

200

A massive global WAN that connects approx. 1 million computer networks in more than 200 countries on all continents

Internet (the Net)

200

The use of electronic communication that allows two or more people at different locations to have a simultaneous conference

Teleconferencing

300

The science of Authentication to verify you are a human and not a robot (Note: its not CAPCHA)

Biometrics

300

Ownership of a Software by a company or person(s).

Intellectual Property

300
A Method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.

Normalization

300

Device that converts signals from analog to digital and vice versa.

Modem

300

collectively, all of the web pages of a particular company or individuals.

Website

400

an Electronic document that acts almost as a key, that verifies the User and who the user is. 

Digital Certificate

400

a Grant that provides a company the rights to their Intellectual Property.

Copyright

400

Each row in a relational table, which is specific, unique representation of the entity

Instance

400

Computer that provide access to various network services, such as printing, workstations, data, and communication.

Servers

400

two or more individuals who act together to perform some task, on either permanent or on temporary basis. They usually share files.

Workgroup

500

The process of converting a string or message into a unreadable line of code

Encryption

500

Intellectual work, such as business plans that companies keep secret. 

Trade Secrets

500

A collection of data so large and complex that it is difficult to manage using traditional database management systems

Big Data

500

A computer program that searches several engines at once and integrates the findings of the various search engines to answer queries posted by users.

Metasearch Engine

500
a Web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, using advanced search and indexing techniques.

Portal

M
e
n
u