VI
VII
VIII
IX
X
100
A collection of data that can be sorted and searched using search algorithms.
What is a database?
100
A unique numerical address assigned to a computer or device on a network.
What is an IP Address?
100
An argument that asks "Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?"
What is the Right to be Forgotten?
100
Users who subscribe to an e-mailing list through a list server.
What is listserve group?
100
The practice of applying skills and processes to activities in order to meet deadlines and achieve desired results.
What is project management?
200
A collection of information in a database table consisting of one or more related fields about a specific entity, such as a person, product or event.
What is a record?
200
A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.
What is MIME?
200
A passwordprotected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.
What is a digital certificate?
200
A program that allows you to control a computer at a remote location.
What is Virtual Network Computing (VNC)?
200
A person, department or device needed to accomplish a task.
What is a resource?
300
A database that contains multiple tables related through common fields.
What is a relational database?
300
Secure version of MIME that adds encryption to MIME data.
What is S/MIME?
300
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
What is a digital signature?
300
A peer-to-peer network on the Internet.
What is P2P?
300
The appointment of a specific resource to a specific task.
What is an assignment?
400
A field containing a value that uniquely identifies each record in a database table.
What is a primary key?
400
A combination of characters that, when read sideways, helps convey emotion in an e-mail message.
What is an emoticon?
400
The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
What is non-repudiation?
400
A "copyleft" license that removes restrictions on the use and distribution of the licensed product.
What is an open-source license?
400
Gradual increases in project scope that can undermine the success of a project.
What is scope creep?
500
A field in a related database table that refers to the primary key in the primary table.
What is a foreign key?
500
A published list of IP addresses known to be sources of spam.
What is a blackhole list?
500
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
What is encryption?
500
A legal contract between the author of software and the end user that defines how the software can be used.
What is an End User License Agreement (EULA)?
500
A person or group with an interest in a project, and with the power to exert influence (either positive or negative) over the project and affect results.
What is a stakeholder?
M
e
n
u