CIL 1502 CID (Terms) Find a good internet source for these terms. Use the sources provided or find your own. Key in the definition and copy and paste the source. When you have completed this list of terms, STUDY STUDY STUDY THE DEFINITIONS. THIS IS WHAT THE EXAM IS BASED ON. 10 points of your exam will be based on these definitions/sources B1. Content and File Management Terms Access point Application Software Backup Cloud computing Cloud Storage CPU/Processor Domain Name Document Properties File/file sharing Folder/Shared folder Folder Creation and Manipulation Information Processing Cycle Input LAN Maximize/minimiz e Network One Drive Operating Systems Output Peripheral/Devices Problem Step Recorder/ Step Recorder/ Screen Recorder Processor Speed Definitions Source http://www.techterms.com/definition/accesspoin t http://en.wikipedia.org/wiki/Application_softw are http://www.techterms.com/definition/backup http://www.techterms.com/definition/cloud_com puting http://searchcloudstorage.techtarget.com/definiti on/cloud-storage http://whatis.techtarget.com/definition/CPU-centralprocessing-unit http://www.techterms.com/definition/domain_na me http://office.microsoft.com/en-us/help/about-fileproperties-HP003071721.aspx http://www.techterms.com/definition/file http://www.techterms.com/definition/folder http://docs.plone.org/external/plone.app.dexterit y/docs/reference/manipulating-contentobjects.html http://www.pcmag.com/encyclopedia/term/4495 3/information-processing-cycle http://www.merriamwebster.com/dictionary/input http://searchnetworking.techtarget.com/definitio n/local-area-network-LAN http://www.techterms.com/definition/maximize http://www.techterms.com/definition/network www.pcmag.com/encyclopedia https://www.google.com/ http://www.webopedia.com/TERM/O/output.htm l http://www.techterms.com/definition/peripheral http://www.pcmag.com/encyclopedia/term/6012 7/screencast http://www.statcan.gc.ca/pub/81-004x/def/4068725-eng.htm protocol RAM ReadyBoost Snip/Screenshot Storage Device System Unit Title bar URL Utility program WAN WLAN WPA2 http://www.techterms.com/definition/protocol http://www.techterms.com/definition/ram http://www.pcmag.com/encyclopedia/term/5761 4/readyboost http://www.techterms.com/definition/screenshot http://www.techterms.com/definition/storagedev ice http://www.techterms.com/definition/system_uni t http://www.techterms.com/definition/titlebar http://searchnetworking.techtarget.com/definitio n/URL http://www.techterms.com/definition/utility http://searchenterprisewan.techtarget.com/defini tion/WAN http://www.pcmag.com/encyclopedia/term/5477 3/wireless-lan www.compnetworking.about.com B2. Internet Identify Management Terms Biometric devices CAPTCHA Encryption IP address LinkedIn Online ethics privacy Social media Strong password Transport layer security (TLS) Definitions Source http://www.techterms.com/definition/biometrics http://www.techterms.com/definition/captcha http://www.techterms.com/definition/encryption http://www.techterms.com/definition/ipaddress http://www.techterms.com/definition/linkedin www.wisegeek.com www.scu.edu http://www.techterms.com/definition/social_med ia http://searchenterprisedesktop.techtarget.com/d efinition/strong-password http://www.pcmag.com/encyclopedia/term/5294 4/tls B3. Device Management and Security Terms Acceptable use policy Adware Antivirus program authentication Bluetooth Biometric devices Botnet Clickjacking Control panel Cookie (1st party) Cookie (3rd party) Cookies Cybercrime Firewall Hacker Hacking History files Identity theft Incognito feature IOS Gatekeeper Jailbreaking Keystoke loggers Logic bomb Macro virus Malware Mobile Malware Pharming Phishing Piggybacking Definitions Source http://www.pcmag.com/encyclopedia/term/3737 6/acceptable-use-policy http://www.techterms.com/definition/adware http://searchsecurity.techtarget.com/definition/a ntivirus-software http://www.pcmag.com/encyclopedia/term/3819 2/authentication http://www.techterms.com/definition/bluetooth http://www.techterms.com/definition/biometrics http://www.techterms.com/definition/botnet http://whatis.techtarget.com/definition/clickjacki ng-user-interface-or-UI-redressing-and-IFRAMEoverlay http://www.techterms.com/definition/controlpan el http://windows.microsoft.com/enus/windows/cookies-faq#1TC=windows-7 http://windows.microsoft.com/enus/windows/cookies-faq#1TC=windows-7 http://www.techterms.com/definition/cookie http://www.techterms.com/definition/cybercrime http://searchsecurity.techtarget.com/definition/fi rewall http://www.techterms.com/definition/hacker http://www.urbandictionary.com/define.php?ter m=hacking http://www.cesm.ucar.edu/models/atmcam/docs/usersguide/node31.html http://www.pcmag.com/encyclopedia/term/4471 9/identity-theft www.support.google.com www.yourdictionary.com http://www.pcmag.com/encyclopedia/term/5992 8/jailbreaking http://en.wikipedia.org/wiki/Keystroke_logging http://searchsecurity.techtarget.com/definition/lo gic-bomb http://searchsecurity.techtarget.com/definition/m acro-virus http://searchmidmarketsecurity.techtarget.com/d efinition/malware www.dictionary.reference.com http://searchsecurity.techtarget.com/definition/p harming http://searchsecurity.techtarget.com/definition/p hishing http://www.pcmag.com/encyclopedia/term/4928 1/piggybacking preferences Ransomeware Rogue Wi-Fi hotspots Rooting Rootkit Router Scareware Secure network Spam Spoofing Spyware Temporary internet files/browser cache Trojan horse virus Twitter bots updates Virus War driving Web bugs Windows Defender Worm virus Zombie www.pcmag.com http://www.2-spyware.com/ransomware-removal http://en.wikipedia.org/wiki/Evil_twin_(wireless_ networks) http://www.pcmag.com/encyclopedia/term/6334 1/rooting http://en.wikipedia.org/wiki/Rootkit http://www.techterms.com/definition/router http://www.techterms.com/definition/scareware www.techopedia.com http://searchmobilecomputing.techtarget.com/de finition/spam http://www.techterms.com/definition/spoofing http://www.techterms.com/definition/spyware http://www.pcmag.com/encyclopedia/term/5274 1/temporary-internet-files http://searchsecurity.techtarget.com/definition/Tr ojan-horse http://en.wikipedia.org/wiki/Twitterbot www.dictionary.reference.com http://searchsecurity.techtarget.com/definition/vi rus http://www.pcmag.com/encyclopedia/term/5420 5/war-driving http://searchsoa.techtarget.com/definition/Webbug http://www.pcmag.com/encyclopedia/term/6125 7/windows-defender http://searchsecurity.techtarget.com/definition/w orm http://www.webopedia.com/TERM/Z/zombie.htm l