Show:
Questions
Responses
Print
IT Business
IT Business
IT Business
IT Business
IT Business
100
software that allows "pop-ups"
What is Adware
100
converting a message to unreadable form
What is Encryption
100
unique entity instance attributes
What is are Identifiers
100
software application for accessing the Web
What is a Browser
100
a processor that directs messages
What is a Router
200
determining user identity
What is Authentication
200
likelihood that a threat will occur
What is Risk
200
a group of related fields
What is a Record
200
virtual meeting place
What is a Chat Room
200
a Web-based personalized gateway
What is a Portal
300
computer under control of a hacker
What is a Bot
300
binary digit
What is a Bit
300
this does not identify file with complete accuracy
What is a Secondary Key
300
a discrete pulse that conveys information in binary form
What is a Digital Signal
300
a device that converts signals between analog and digital
What is a Modem
400
a collection of related records
What is a Data File
400
set of core data
What is Master Data
400
mutual efforts
What is Collaberation
400
a program that finds specific information by the use of key words
What is a Search Engine
500
malicious software
What is Malware
500
groupings of entities
What is Entity Classes
500
transmission capacity
What is Bandwidth
500
a set of rules or procedures
What is a Protocol
500
a common local area network protocol
What is Ethernet