CP102 Final
CP102 Final
CP102 Final
as the base-16 number system. (unicode) 1GL: machine language. 2GL: assembly language. 3GL:
COBOL. 4GL: SQL.5GL: PROLOG 7: to securely erase data, the U.S. Department of Defense suggests that the data be overwritten 7 times.access card reader-A device that reads information from a magnetic strip on
the back of a credit card–like an access card. access method-A method to control which computer is allowed to use transmission media at a certain time. active topology-A type of network design where the nodes
participate in moving data through the network.
Adobe illustrator-software to help create digital art Affective computing: a type of computing that relates to emotion or that deliberately tries to influence emotion.
Affective Computing-A type of computing that relates to emotion or that deliberately tries to influence emotion Aggregator: locates all the RSS series to which you have subscribed and automatically downloads new
content. Analog-to-digital converter: changes your voice’s sound waves into digital signals. Arithmetic logic unit (ALU): the part that performs arithmetic and logic calculations. artificial intelligence (AI)-The
branch of computer science that deals with the attempt to create computers that think like humans. application server-A server that acts as a repository for application software. Artificial Neural Networks(ANNs)-
computer systems constructed based on the structure of the human brain using loosely connected neurons ASCII: to represent each letter or character as an 8-bit (or 1-byte) binary code. (assigns an integer to 127 different
characters) (number system based on 10 = decimal) Assistive (adaptive) Technology-Any device, software feature, or app that is designed for individuals with disabilities authentication server-A server that keeps
track of who’s logging on to the network and which services on the network are available to each user. Autonomy: defined as working without continual direction and control. bastion host-A heavily secured server
located on a special perimeter network between the company’s secure internal network and its firewall. batch processing-The accumulation of transaction data until a certain point is reached, at which time several
transactions are processed at once. Binary decision: answered in only two ways (yes/no). Binary Digit(Bit)-A digit that corresponds to the on and off states of a computers switches contains value of either 1 or 0. Binary
language-language computers use to process data into information, consisting of 1s and 0s.binary large object (BLOB)-Audio clips, video clips, pictures, and extremely large documents. Biometric authentication
device: a device that uses so*me unique characteristic of human biology to identify authorized users. (help improve social skills on people with autism at the MIT Media Lab) biometric authentication device-A device
that uses some unique characteristic of human biology to identify authorized users. Boot-sector virus: a virus that replicates itself into the master boot record of a flash drive or hard drive.Botnet: a large group of software
applications (called robots or bots) that run without user intervention on a large number of computers. Bread crumb trail-A list of pages within a Web site that you have visited and that usually appears at the top of a page
bridge-A device that is used to send data between different collision domains in a network, depending on where the recipient device is located.
brute-force attack-An attempt to access an account by repeatedly trying different passwords. Bus linear bus topology-A system of networking connections in which all devices are connected in sequence on a single
cable. business intelligence (BI)-The ability to improve business decision making with databases and other fact-based support systems.business intelligence system-Systems used to analyze and interpret data in
order to enable managers to make informed decisions about how best to run a business. Cache memory: act as holding places for recently or frequently used instructions or data that the CPU accesses the most. (3 levels).
caption-A property in a database that enables the field name to display in a more meaningful or readable manner. cascading style sheet (CSS)-A list of rules that defines in one single location how to display HTML
elements. CD ripping-encoding CDs to MP3 format. Centralized-A characteristic of client/ server networks where the server, not the individual nodes, provide services such as data security. Charm: displayed on a
Windows 8 screen when moving the cursor to the upper-right corner of the screen Chromebook-Google's first attempt at a netbook where all applications and files are stored on the Web? clickstream data-Software used
on company websites to capture information about each click that users make as they navigate through the site.Client/server network(server based network)-A type of network that uses servers to deliver services to
computers that are requesting them (clients)
Client: a computer that requests information from a server in a client/server network (such as your computer when you are connected to the Internet). (let’s you display/interact with text and other media on the web) CMYK-
A colour model in which all colours are described as a mixture of four base colours (cyan, magenta, yellow, and black)
Coaxial cable-A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.
Coaxial: cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. Cognitive Surplus-The combination of leisure time and the tools to be creative communications server-
A server that handles all communications between the network and other networks, including managing Internet connectivity.
Compiler: program that translates code into binary 0s and 1s and ignores comments. completeness check-In a database, ensures that all required fields have been completed. Computer Vision-The ability of a
computing device to interpret visual information the way humans do connectionless protocol-A protocol that a host computer can use to send data over the network without establishing a direct connection with any
specific recipient computer.consistency check-In a database, compares the values of data in two or more fields to see if those values are reasonable. CSMA/CD-The method used on Ethernet networks to avoid data
collisions; A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals. Cyberloafing: doing anything with a computer that’s unrelated to a job.data collision-
When two computers send data at the same time and the sets of data collide somewhere in the transmission media. data dictionary (database schema)-A map of a database that defines the features of the fields in the
database. data inconsistency-Data for a record being different in two different lists.data integrity-When the data in a database is accurate and reliable.data mart-Small slices of a data warehouse grouped together and
separated from the main body of data in the data warehouse so that related sets of data can be analyzed.data redundancy-Duplicated data in a list.data staging-An intermediate storage area used for data processing
during the extract, transform, and load process; between the data source and the data warehouse.Data transfer rate (bandwidth): the maximum speed at which data can be transmitted between two nodes on a network;
measured in megabits per second (Mbps) or gigabits per second (Gbps).data type (field type)-(1) Describes the kind of data being stored at the memory location; each programming language has its own data types
(although there is some degree of overlap). (2) In a database, indicates what type of data can
Data warehouse: a large-scale collection of data that contains and organizes in one place all the data from an organization’s multiple databases. data warehouse-A large-scale collection of data that contains and
organizes in one place all the data from an organization’s multiple databases. database administrator (DBA) (database designer)-An information technology professional responsible for designing, constructing, and
maintaining databases.database server-A server that provides client computers with access to information stored in databases. database management system (DBMS)-A specially designed application software used
to create and manage databases.
NOS: software used to set up and manage a network. NoSQL database-A nonrelational database developed to store unstructured data generated primarily from Web 2.0 applications such as clickstream data, social media
data, and location-based information. Data-centralization-When data is maintained in only one file. decentralized-A characteristic of peer-to-peer networks where the individual nodes provide services such as data
security. decision support system (DSS)-A type of business intelligence system designed to help managers develop solutions for specific problems. dedicated server-A server used to fulfill one specific function, such
as handling e-mail.
Deep Learning-AI systems capable of learning from their mistakes (just as humans do) HAN: a network located in your residence that connects all your digital devices.
handshaking-In a connection-oriented protocol, the process of exchanging control packets before exchanging data packets.
default value-The value database automatically uses for a field unless the user enters another value.Desktop publishing (DTP) software: programs for incorporating and arranging graphics and text to produce creative
documents. (QuarkXPress) detail report-A report generated by a management information system that provides a list of the transactions that occurred during a certain time period. Digital signal processor: compresses
cell phone data for easy transmission. Disk defragmentation: the process of regrouping related pieces of files on the hard drive, enabling faster retrieval of the data. Distributed(grid) computing-A software system in
which components located on networked computers interact to achieve a common goal. Document Object Model (DOM)-Used by JavaScript to organize objects and page elements.
domain name system (DNS) server-A server that maintains a database of domain names and converts domain names to Internet protocol addresses. Dreamweaver: web page design Dynamic Host Configuration
Protocol (DHCP)-A protocol for assigning dynamic Internet protocol addresses. dynamic HTML (DHTML)-A combination of technologies—HTML, cascading style sheets, and JavaScript—used to create lively and
interactive websites. AJAX-A collection of technologies that allow the creation of web applications that can update information on a page without requiring the user to refresh or leave the page.Einstein Initiative-strategic
plan to focus on the young electronic data interchange (EDI)-The exchange of large amounts of data in a standardized electronic format. Encryption virus: a malicious program that searches for common data files and
compresses them into a file using a complex encryption key, thereby rendering the files unusable.enterprise resource planning system- business intelligence system that accumulates in a central location all information
relevant to running a business and makes it readily available to whoever needs it to make decisions.
ESP Device-Emotional social prosthesis-developed at MIT media lab, it is targeted at helping people who have autism Ethernet port: a port that transfers data at speeds of up to 10 Gbps; used to connect a computer to a
modem or to a network. (802.11 ac) (UTTP) exception report-A report generated by a management information system that shows conditions that are unusual or that need attention by system users.Executable
program: the binary sequence that instructs the CPU to run the programmer’s code.
Expansion cards (or adapter cards)-A circuit board with specific functions that augment the computer’s basic functions and provide connections to other devices (sound cards/GPUs) eXtensible Markup Language
(XML)-A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described
rather than how it’s to be displayed. extranet-An area of an intranet that only certain entities or individuals can access; the owner decides who will be permitted to access it. Feature phone-inexpensive cell phone fiber-
optic cable-A cable that transmits data via light waves along glass or plastic fibers. Fibre optic cable: made up of plastic or glass and transmits data at extremely fast speeds. field constraint-A property that must be
satisfied for an entry to be accepted into the field. field name-A way of describing the information in the field.field properties-In an Access database table, the field name, data type, and other data elements.field-The
component of a database in which the database stores each category of information. File server-A server that stores and manages files for network users or that acts as a storehouse for files that users can download. filter-In
a database, temporarily displays records that match certain criteria.flat database-A type of database that is often represented as a list or simple table.Flatbed scanner-Used to create a digital image from a tangible image
Floating point: IEEE’s floating point standard describes how numbers containing fractional parts are represented in the binary number system.foreign key-In a relational database, the common field between tables that’s
not the primary key. Formula: = D8-D17 and Function: = SUM(B10:B16) Frame-Groups of data packets that are sent together in a package
frame-Groups of data packets that are sent together in a package. FSB: connects the processor to the system memory. (C=12) FTP: protocol that allows files to be transferred over the Internet. fuzzy logic-Enables the
interjection of experiential learning into knowledge-based systems by allowing the consideration of probabilities.
Gigabyte(GB)-a billion bytes Gigahertz(GHz)-One billion hertz Byte-Eight binary units (Bits) GUI: Mac OS and Microsoft Windows user interface
Hacktivism-Using computers and computer networks in a subversive way to promote an agenda Head crash: impact of the read/write head against the magnetic platter of the hard drive; often results in data loss.
hexadecimal digit-A digit with 16 possible values: 0–9 and A–F honey pot-A computer system that’s set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of
great value.HTML: hypertext markup language (special symbols called tags)
HTTP: protocol that allows files to be transferred over a web server. hybrid topology-Combining multiple topologies on one network.
Hyperthreading: a technology that permits quicker processing of information by enabling a new set of instructions to start executing before the previous set has finished.
IDE: integrated development environment. (can support different languages)Impact -have tiny hammer like keys that strike the paper through an inked ribbon
Inductive: type of system that does not have a touch screen. information assurance-Ensuring that information systems contain accurate information and are adequately secured against tampering.information system-
A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software based solution used to gather and analyze information.information system-A system that
includes data, people, procedures, hardware, and software that help in planning and decision making; a software based solution used to gather and analyze information.Internet cache-A section of the hard drive that stores
information that may be needed again, such as Internet protocol addresses and frequently accessed web pages.Internet exchange point (IXP)-A way of connecting Internet service providers (ISPs) that’s made up of one or
more network switches to which the ISPs connect.Internet protocol version 6 (IPv6)-An Internet protocol addressing scheme that makes IP addresses longer, thereby providing more available addresses.Interpreter:
translates source code line by line into an intermediate form.intranet-A private network set up by a business or an organization that’s used exclusively by a select group of employees, customers, suppliers, volunteers, or
supporters.jam signal-A special signal sent to network nodes alerting them that a data collision has occurred.JavaScript-An Internet protocol (IP) addressing scheme that makes IP addresses longer, thereby providing more
available addresses.join query-A query used to extract data that’s in two or more tables in a database. Kernel: operating system supervisor programkey pair-The two keys used in public-key encryption.
Kilobyte(KB)-A unit of computer storage equal to approximately 1,000 bytes. Knowledge Representation-Encoding information about the world into forms that an AI system can understand knowledge-based
system-A business intelligence system that provides intelligence that supplements the user’s own intellect and makes the decision support system more effective.LAN: a network in which the nodes are located within a
computer lab.Latency (rotational delay): the process that occurs after the read/write head of the hard drive locates the correct track and then waits for the correct sector to spin to the read/write head. Live bookmarks: A
feature found in Mozilla Firefox that allows users to subscribe to RSS feeds and have the content of those feeds shown in their browser bookmarks. (adds RSS technology to bookmarks). local area network (LAN)-A
network in which the nodes are located within a small geographic area. Machine Cycle: A machine cycle consists of the steps that a computer's processor executes whenever it receives a machine language instruction.
Fetch, Decode, Execute and Store. Machine Cycle–The series of steps a central processing unit goes through when it performs a program instruction MAN: a large network designed to provide access to a specific
geographic area, such as a large city management information system (MIS)-A type of business intelligence system that provides timely and accurate information that enables managers to make critical business
decisions.many-to-many relationship-In a relational database, records in one table are related to multiple records in a second table, and vice versa. media access control (MAC) address-The physical address,
similar to a serial number, of each network adapter. Megabyte(MB)-a unit of computer storage equal to approximately 1 million bytes metadata-Data that describes other data.MMS: text, sound, images, and video
clips.Variable: allocated storage space in RAM.Mobile switching centre: central location, which a base station transfers cell phone req.model management system-Software that assists in building management
models in decision support systems, through the use of internal and external data, provides a view of a particular business situation for the MP3: digital music file format.MPEG-4: digital video file format.MS-DOS first
used a(n) command driven interface. multidimensionaldatabase-A database that stores data from different perspectives, called dimensions, and organizes data in cube format.multi-factor authentication-A process
that requires two of the three assigned factors be demonstrated before authentication is granted.Multipurpose Internet Mail Extensions (MIME)-Specification for sending files as attachments to email.NAS: device
facilitates file sharing and data backup. Natural Language Processing(NLP)-A knowledge based business intelligence thatallows users to communicate to the computer in spoken or written language instead of computer
language Near field communication(NFC)-Communication protocols that enable devices to communicate with each other when they are held in close proximity. NFC is commonly used for mobile paymentsnegative
acknowledgment (NAK)-In data exchange, the communication sent from one computer or system to another stating that it did not receive a data packet in readable formnetwork administrator-Person who maintains
networks for a business or organization.network operating system -Software that handles requests for information, Internet access, and the use of peripherals for network nodes, providing the services necessary for the
computers on the network to communicate. network topology-The physical or logical arrangement of computers, transmission media (cable), and network components. NIC: connects a node to a network.Node: a device
connected to a network such as a computer, a peripheral (such as a printer), or a communications device (such as a modem).Nonvolatile storage-permanent storage, as in read-only memory (ROM) normalization-A
process to ensure data is organized most efficiently in a database.numeric check-In a database, confirms that only numbers are entered in a field.Object Query Language (OQL)-A query language used by many object-
oriented databases.object-oriented database-A database that stores data in objects rather than in tables. Omnidirectional: receiving signals from or transmitting in all directions. one-to-many relationship-In a
relational database, a record appears only once in one table while having the capability of appearing many times in a related table.one-to-one relationship-In a relational database, each record in a table has only one
corresponding record in a related table. online analytical processing (OLAP)-Software that provides standardized tools for viewing and manipulating data in a data warehouse.online transaction processing
(OLTP)-The real-time processing of database transactions online. Open Systems Interconnection (OSI)-A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides
guidelines for modern networks.Open-source software: program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software
products.Operator: coding symbol that represents a fundamental action of language.Optical character recognition(OCR) software-Software that digitizes and saves text in digital form Organic light-emitting
diode(OLED) display-displays that use organic compounds to produce light when exposed to an electric current, they do not require backlights(use less power)packet screening-Having a screening router examine data
packets to ensure they originated from or are authorized by valid users on a network.Packets: data are sent through a network in bundles,PAN: network used to communicate among devices close to one person. Parallel
processing: a large network of computers, with each computer working on a portion of the same problem simultaneously.passive topology-In a network, a type of topology where the nodes do nothing to move data
along the network. Path: in the URL http://www.microsoft.com/surface, the portion labeled “surface” is the path.
petabyte is equal to one quadrillion (1,000,000,000,000,000) bytes and is the largest type of dataPiggybacking: using the network without the owner's permission.Pin: place an application tile on the start screen
Pipelining: a technique that allows the CPU to work on more than one instruction (or stage of processing) at the same time, thereby boosting CPU performance. Platform: combination of processor and operating system
Platters: a thin, round, metallic storage plate stacked onto the hard drive spindle.
Plug and Play (PnP): the technology that enables the operating system, once it is booted up, to automatically recognize any new peripherals and to configure them to work with the system.Plug-ins: adobe reader, flash
player, and QuickTime Player are examples of software programs called plug-ins.PMP: portable media player. point of presence (POP)-A bank of modems, servers, routers, and switches through which Internet users
connect to an Internet service provider. Polymorphic virus: a virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. possessed object-Any object that
users carry to identify themselves and that grants them access to a computer system or facility. primary key field-In a database, a field that has a value unique to a record. protocol-A set of rules for conducting
communications. proxy server-A server that acts as a go-between, connecting computers on an internal network with those on external networks (like the Internet).Protocol: In the URL http://www.microsoft.com/surface,
the portion labeled “http” is the protocol.Peachtree: accounting software and Peer-to-peer: each node can communicate directly with every other node (comp., peripheral, or communication) on the network. Pharming:
planting malicious code on a computer that alters the browser’s ability to find web addresses and that directs users to bogus websites.Pseudocode: a combination of natural language and programming language that is used
to document algorithms.public key-The key for coding distributed to the public in public-key encryption.query language-A specially designed computer language used to manipulate data in or extract data from a
database. query-in a database, a way of retrieving information that defines a particular subset of data; can be used to extract data from one or more tables.
RAID 0: the strategy of running two hard drives in one system, cutting in half the time it takes to write a file.RAID 1: the strategy of mirroring all the data written on one hard drive to a second hard drive, providing an
instant backup of all data. (automatically duplicates) range check-Ensures that the data entered into the field of a database falls within a certain range of values. Real Time Operating System (RTO)- software
component that rapidly switches between tasks real-time processing-The processing of database transactions in which the database is updated while the transaction is taking place.record-A group of related fields in a
database.referential integrity-In a relational database, a condition where, for each value in the foreign key table, there’s a corresponding value in the primary key table.relational algebra-The use of Englishlike
expressions that have variables and operations, much like algebraic equations, to extract data from databases using Structured Query Language.relational database-A database type that organizes data into related tables
based on logical groupings. relationship-In a relational database, a link between tables that defines how the data is related. ring (loop) topology-A type of network topology where computers and peripherals are laid out
in a configuration resembling a circle. ROM-stores data and instructions that cannot be changed or erased; holds all instructions the computer needs to start up. root DNS server-A domain name system (DNS) server that
contains the master listings for an entire top-level domain. Rootkit: programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.Router: directs data traffic
between networks. router-A device that routes packets of data between two or more networks. Rules Based Questions-software that asks questions and responds based on preprogrammed algorithms Runtime error:
error in a program that occurs when a programmer accidentally writes code that divides by zero Sampling rate: the number of times per second a signal is measured and converted to a digital value. Sampling rates are
measured in kilobits per second. scalability-A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes. Script: a list of commands (mini-
programs or macros) that can be executed on a computer without user interaction. SDLC: first: problem/opportunity identification, second: analysis, third: design, fourth: development, fifth step: testing and installation.
Sectors: pie-shaped wedges on the surface of a hard drive . Seek time: the time it takes for the hard drive’s read/write heads to move over the surface of the disk to the correct track. select query-In Structured Query
Language, displays a subset of data from a table (or tables) based on the criteria specified. Semiconductor-Any material that can be controlled to either allow it to conduct electricity or act as an insulator Server: a
computer that provides resources to other computers on a network. (computer that receives a request and returns data is a(n) server) shielded twisted-pair (STP) cable-Twisted-pair cable that contains a layer of foil to
reduce interference. Simple Mail Transfer Protocol (SMTP)-The protocol responsible for sending e-mail along the Internet to its destination; part of the Internet protocol suite. Software as a Service: a vendor hosts
the software online over the Internet and you do not have to install it on your computer. Source code: programmers’ instructions written in a higher-level language. Spooler: coordinates print jobs(performs machine cycle)
(registers) SQL: structured query language. SSD-Same type of memory as flash drive but can reach date in 10th of time star topology-The most widely deployed client/server network topology, where the nodes connect
to a central communications device called a switch in a pattern resembling a star. Stealth virus: a virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.
Structure (analytical) data-Data such as “Bill” or “345,” as opposed to unstructured data. Structured Query Language (SQL)-A database programming language used to construct queries to extract data from
relational databases; one example of a fourth-generation language. summary report-A report generated by a management information system that provides a consolidated picture of detailed data; these reports usually
include some calculation or visual displays of information. SuperFetch: a memory-management technique used by Windows. Monitors the applications you use the most and preloads them into your system memory so that
they’ll be ready to go. Supervised Learning- use of labeled datasets to train algorithms that to classify data or predict outcomes accurately. Swap file: temporary storage area on the hard drive (hard drive measured in
milliseconds) Switch: handles data traffic between nodes on the same network. switch-A device for transmitting data on a network that makes decisions, based on the media access control address of the data, as to where
the data is to be sent. Syntax: a syntax error is caused by not following the strict, precise set of rules for a specific programming language.
Syntax: agreed-on set of rules defining how the language must be structures. T line-A communications line that carries digital data over twisted-pair wires. table (file)-A group of related records in a database.
Telephony: use of equipment to provide voice communications over distance. terminator-A device that absorbs a signal so that it’s not reflected back into parts of the network that have already received it.Tethering:
connecting a computer to the Internet through a smartphone’s cellular access.The cell address C5 indicates that the cell ________. at column C, row 5 of the worksheet Throughput: the actual speed of data transfer
that’s achieved. It’s usually less than the data transfer rate. time-variant data-Data that doesn’t pertain to one time period. token method-The access method used by ring networks to avoid data collisions. Top-level
domain: the suffix, often of three letters (such as .com or .edu), in the domain name that indicates the kind of organization the host is. Tracks: a concentric circle that serves as a storage area on a hard drive platter. token-
A special data packet used to pass data on a network. transaction-processing system-A type of business intelligence system for keeping track of everyday business activities Transistor-Electric switches built out of
layers of a special type of material called a semiconductor Integrated circuit(Chip)-Tint regions of semiconductor material that support a huge number of transistors Transmission media-The radio waves or the
physical system (cable) that transports data on a network Tunneling-The main technology for achieving a virtual private network; the placement of data packets inside other data packets Application server-A server that
acts as a repository for application software. Turing Test-A simple test to distinguish between a human and a computer system, named after Alan Turing IT-The set of techniques used in processing and retrieving
information tunneling-The main technology for achieving a virtual private network; the placement of data packets inside other data packets.
twisted-pair cable-Cable made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
Ultrabook-Full feature but lightweight laptop that features low-power processor and SSD Liquid crystal display (LCD)-tech used in flat-panel monitors
unshielded twisted-pair (UTP) cable-The most popular transmission media option for Ethernet networks. UTP cable is composed of four pairs of wires that are twisted around each other to reduce electrical
interference.unstructured data-Audio clips, video clips, pictures, and extremely large documents. Also called binary large object (BLOB).
Unsupervised learning-allows the system to identify patterns within data sets on its own. Utility programs-help manage system resources such as the hard drives
validation-The process of ensuring that data entered into a field of a database meets specified guidelines. VeriMed: a personal identification chip that is about the size of a grain of rice and implanted under the skin.
Vertical market software: software that’s developed for and customized to a specific industry’s needs (such as a wood inventory system for a sawmill) virtual private network (VPN)-A network that uses the public
Internet communications infrastructure to build a secure, private network among various locations. virtualization-Using specialized software to make individual physical servers behave as though they are more than one
physical device. VoIP (voice over Internet protocol): a technology that facilitates making telephone calls across the Internet instead of using conventional telephone lines. (ex. Skype) Volatile Storage-Temporary
storage, such as in random access memory. When the computer is off the data in volatile storage is cleared out WAN: a network that spans a large physical distance. (Internet) WAN-A network made up of local area
networks (LANs) connected over long distances web server-A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.
wireless access point (WAP)-Gives wireless devices a sending and receiving connection point to the network. wireless ISP-An ISP that provides service to wireless devices such as PDA/smartphones wireless
network interface card (wireless NIC)-A special network adapter card that allows a computing device to connect to a network using wireless media. 12Witness Project: hopes to stop human rights abuses throughout
the world.
XML: enables users to define their own data-based tags and facilitates exchange of information between websites.