CIL 1502 CID (Terms)

advertisement
CIL 1502 CID (Terms)
Find a good internet source for these terms. Use the sources provided or find your own. Key in the definition and
copy and paste the source. When you have completed this list of terms, STUDY STUDY STUDY THE DEFINITIONS.
THIS IS WHAT THE EXAM IS BASED ON.
10 points of your exam will be based on these definitions/sources
B1. Content and File Management
Terms
Access point
Application
Software
Backup
Cloud computing
Cloud Storage
CPU/Processor
Domain Name
Document
Properties
File/file sharing
Folder/Shared
folder
Folder Creation
and Manipulation
Information
Processing Cycle
Input
LAN
Maximize/minimiz
e
Network
One Drive
Operating Systems
Output
Peripheral/Devices
Problem Step
Recorder/
Step Recorder/
Screen Recorder
Processor Speed
Definitions
Source
http://www.techterms.com/definition/accesspoin
t
http://en.wikipedia.org/wiki/Application_softw
are
http://www.techterms.com/definition/backup
http://www.techterms.com/definition/cloud_com
puting
http://searchcloudstorage.techtarget.com/definiti
on/cloud-storage
http://whatis.techtarget.com/definition/CPU-centralprocessing-unit
http://www.techterms.com/definition/domain_na
me
http://office.microsoft.com/en-us/help/about-fileproperties-HP003071721.aspx
http://www.techterms.com/definition/file
http://www.techterms.com/definition/folder
http://docs.plone.org/external/plone.app.dexterit
y/docs/reference/manipulating-contentobjects.html
http://www.pcmag.com/encyclopedia/term/4495
3/information-processing-cycle
http://www.merriamwebster.com/dictionary/input
http://searchnetworking.techtarget.com/definitio
n/local-area-network-LAN
http://www.techterms.com/definition/maximize
http://www.techterms.com/definition/network
www.pcmag.com/encyclopedia
https://www.google.com/
http://www.webopedia.com/TERM/O/output.htm
l
http://www.techterms.com/definition/peripheral
http://www.pcmag.com/encyclopedia/term/6012
7/screencast
http://www.statcan.gc.ca/pub/81-004x/def/4068725-eng.htm
protocol
RAM
ReadyBoost
Snip/Screenshot
Storage Device
System Unit
Title bar
URL
Utility program
WAN
WLAN
WPA2
http://www.techterms.com/definition/protocol
http://www.techterms.com/definition/ram
http://www.pcmag.com/encyclopedia/term/5761
4/readyboost
http://www.techterms.com/definition/screenshot
http://www.techterms.com/definition/storagedev
ice
http://www.techterms.com/definition/system_uni
t
http://www.techterms.com/definition/titlebar
http://searchnetworking.techtarget.com/definitio
n/URL
http://www.techterms.com/definition/utility
http://searchenterprisewan.techtarget.com/defini
tion/WAN
http://www.pcmag.com/encyclopedia/term/5477
3/wireless-lan
www.compnetworking.about.com
B2. Internet Identify Management
Terms
Biometric devices
CAPTCHA
Encryption
IP address
LinkedIn
Online ethics
privacy
Social media
Strong password
Transport layer security
(TLS)
Definitions
Source
http://www.techterms.com/definition/biometrics
http://www.techterms.com/definition/captcha
http://www.techterms.com/definition/encryption
http://www.techterms.com/definition/ipaddress
http://www.techterms.com/definition/linkedin
www.wisegeek.com
www.scu.edu
http://www.techterms.com/definition/social_med
ia
http://searchenterprisedesktop.techtarget.com/d
efinition/strong-password
http://www.pcmag.com/encyclopedia/term/5294
4/tls
B3. Device Management and Security
Terms
Acceptable use
policy
Adware
Antivirus program
authentication
Bluetooth
Biometric devices
Botnet
Clickjacking
Control panel
Cookie (1st party)
Cookie (3rd party)
Cookies
Cybercrime
Firewall
Hacker
Hacking
History files
Identity theft
Incognito feature
IOS Gatekeeper
Jailbreaking
Keystoke loggers
Logic bomb
Macro virus
Malware
Mobile Malware
Pharming
Phishing
Piggybacking
Definitions
Source
http://www.pcmag.com/encyclopedia/term/3737
6/acceptable-use-policy
http://www.techterms.com/definition/adware
http://searchsecurity.techtarget.com/definition/a
ntivirus-software
http://www.pcmag.com/encyclopedia/term/3819
2/authentication
http://www.techterms.com/definition/bluetooth
http://www.techterms.com/definition/biometrics
http://www.techterms.com/definition/botnet
http://whatis.techtarget.com/definition/clickjacki
ng-user-interface-or-UI-redressing-and-IFRAMEoverlay
http://www.techterms.com/definition/controlpan
el
http://windows.microsoft.com/enus/windows/cookies-faq#1TC=windows-7
http://windows.microsoft.com/enus/windows/cookies-faq#1TC=windows-7
http://www.techterms.com/definition/cookie
http://www.techterms.com/definition/cybercrime
http://searchsecurity.techtarget.com/definition/fi
rewall
http://www.techterms.com/definition/hacker
http://www.urbandictionary.com/define.php?ter
m=hacking
http://www.cesm.ucar.edu/models/atmcam/docs/usersguide/node31.html
http://www.pcmag.com/encyclopedia/term/4471
9/identity-theft
www.support.google.com
www.yourdictionary.com
http://www.pcmag.com/encyclopedia/term/5992
8/jailbreaking
http://en.wikipedia.org/wiki/Keystroke_logging
http://searchsecurity.techtarget.com/definition/lo
gic-bomb
http://searchsecurity.techtarget.com/definition/m
acro-virus
http://searchmidmarketsecurity.techtarget.com/d
efinition/malware
www.dictionary.reference.com
http://searchsecurity.techtarget.com/definition/p
harming
http://searchsecurity.techtarget.com/definition/p
hishing
http://www.pcmag.com/encyclopedia/term/4928
1/piggybacking
preferences
Ransomeware
Rogue Wi-Fi hotspots
Rooting
Rootkit
Router
Scareware
Secure network
Spam
Spoofing
Spyware
Temporary internet
files/browser cache
Trojan horse virus
Twitter bots
updates
Virus
War driving
Web bugs
Windows Defender
Worm virus
Zombie
www.pcmag.com
http://www.2-spyware.com/ransomware-removal
http://en.wikipedia.org/wiki/Evil_twin_(wireless_
networks)
http://www.pcmag.com/encyclopedia/term/6334
1/rooting
http://en.wikipedia.org/wiki/Rootkit
http://www.techterms.com/definition/router
http://www.techterms.com/definition/scareware
www.techopedia.com
http://searchmobilecomputing.techtarget.com/de
finition/spam
http://www.techterms.com/definition/spoofing
http://www.techterms.com/definition/spyware
http://www.pcmag.com/encyclopedia/term/5274
1/temporary-internet-files
http://searchsecurity.techtarget.com/definition/Tr
ojan-horse
http://en.wikipedia.org/wiki/Twitterbot
www.dictionary.reference.com
http://searchsecurity.techtarget.com/definition/vi
rus
http://www.pcmag.com/encyclopedia/term/5420
5/war-driving
http://searchsoa.techtarget.com/definition/Webbug
http://www.pcmag.com/encyclopedia/term/6125
7/windows-defender
http://searchsecurity.techtarget.com/definition/w
orm
http://www.webopedia.com/TERM/Z/zombie.htm
l
Download