The Web
Social Media
Software
Digital Security
The ICT Industry
100
The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.
What is browser cache?
100
An activity in which a group of people contribute, usually online, to solving a problem or completing a task.
What is crowd sourcing?
100
A file, usually with an .exe extension, containing instructions that tell a computer how to perform a specific task.
What is and executable file?
100
A computer program used to identify, isolate, and eliminate viruses by scanning files as they arrive, leave, or are executed.
What is antivirus software?
100
A set of guidelines designed to help professionals make on-the-job ethical decisions.
What are code of ethics?
200
A message sent from a Web server to a browser and stored on a user’s hard disk, usually containing information about the user.
What is a cookie?
200
A person who receives your tweets.
What is a follower?
200
A method that is used by an operating system to keep track of the locations for all files stored on a device.
What is a file system?
200
Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts.
What is a firewall?
200
A person who supervises database design, development, testing, and maintenance.
What is a database administrator?
300
A set of commands, such as GET and POST, that are transmitted between Web servers and clients.
What is HTTP methods?
300
The section of an email file that contains address, subject, and file attachment information.
What is a message header?
300
Software that is copied, sold, or distributed without permission from the copyright holder.
What is pirated software?
300
Programs such as viruses, worms, and bots designed to disrupt computer operations.
What is malware?
300
A section of a contract that prohibits a worker from producing work that would compete in some way with the business while employed by the business or for a period time after leaving the business.
What is a non compete clause?
400
In the context of browsers, search engines, and the Web, the ability of software to better locate information using accumulated historical queries.
What is predictive services?
400
Social networking services, such as Yelp and Google Maps, that offer location-based interaction.
What is geosocial networking?
400
Legal permission for software to be used on any and all computers at a specific location (for example, within a corporate building or on a university campus).
What is a site license?
400
In the context of antivirus software, the process of identifying malware based not on a signature, but on other factors, such as context and behavior.
What is heuristic analysis?
400
A statistical and graphical depiction used to describe phases for product adoption, beginning with innovators and early adopters, followed by early majority, late majority, and laggards.
What is Roger Bell's curve?
500
Links between Web pages that go in one direction only, linking A to B, but not linking B back to A.
What are unidirectional links?
500
Data pertaining to a person that can be used for purposes of identification or tracking.
What is personally identifiable information, or PII?
500
Software that carries restrictions on its use that are delineated by copyright, patents, or license agreements.
What is a Proprietary software?
500
A method of breaking encryption code by trying all possible encryption keys.
What is a brute force attack?
500
A non-binding document that is the cyber equivalent of the Geneva Convention, specifying the rules of cyberwarfare.
What is the Tallinn Manual?
M
e
n
u