CS 160
Home | About Our School | Final Online Exam | Programs | Directions | Contact Us
Final Online Exam

Enter subhead content here

Answer:

  1. The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework.     
  2. Microsoft® Active Server Pages (ASP) is a server-side scripting environment that you can use to create and run dynamic, interactive Web server applications. With ASP, you can combine HTML pages, script commands, and COM components to create interactive Web pages and powerful Web-based applications that are easy to develop and modify.
  3. ACCESS is a global provider of advanced software technologies to the mobile and beyond-PC markets.

  4. Access Privileges is the extent to which a user may operate a system resource on a network or a file server.

  5. Active hyperlink is a hyperlink that is currently selected in a Web browser. Some Web browsers indicate the active hyperlink by changing its color.

  6. Information technology (IT) administrators manage the day-to-day operations of IT systems to make sure that they run effectively.

  7. Authentication is the process of obtaining identification credentials such as name and password from a user and validating those credentials against some authority.

  8. Data Administrator is the individual or organization responsible for the specification, acquisition, and maintenance of data management software and the design ...

  9. Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.

  10. e-Government (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.

  11.  Encryption is the most effective way to achieve data security.

  12. Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

  13. ITR (Information Technology Resources) is a Veteran owned Technical consulting and recruiting firm focused on the Information Technology Industry.

  14. Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.

  15. ISO (International Organization for Standardization) is the world's largest developer and publisher of International Standards and also a non-governmental organization that forms a bridge between the public and private sectors.

  16. Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content
  17. Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent.
  18. A patch is a small piece of software designed to fix problems with or update a computer program or its supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance.
  19.  
  20. The purge function is a handy way to clear a page's server cache. This forces the wiki software to rebuild the page completely.

  21. Remote access is the ability to get access to a computer or a network from a remote distance. 
  22. Social Engineering is a hacker term for deceiving people into revealing confidential information. It is a tactic that is often used by hackers to gain information about a network or simply to bypass a complex security system altogether.
  23. Spoofing is A type of deception where an intruder attempts to gain unauthorized access to a user’s system or information via pretending to be the user.
  24. Strong Encryption is an encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.

  25.  User ID is the code used by a User to identify himself when he logs into a system and starts a Login Session. It is used by the system to uniquely identitfy this User. A User ID is one-half of a set of Credentials.

Enter supporting content here