Friday, January 14, 2011
IC3 Certification Exam
IC3 Certification Exam is the world's first validated, standards-based training and certification program for basic computing and internet knowledge .
Transport Security Layer
Transport Security Layer are protcols that provide communications security over the internet.
Spyware
Spyware is a computer software that obtains information from a user's computers without the user's knowledge of consent.
Secure Sockets Layer
Secure Sockets Layer is a security technology that is commonly used to secure serverto browser transactions.
Repetitive strain Injury
Repetitive strain Injury is an injury caused by doing an action over and over again.
Hardware Firewall
Hardware firewall is firewall that is built into a router or a stand-alone device.
Brute force attacks
Brute force attacks are methods of obtaining a user's authentication credentials.
Browser hijacking
Browser hijacking is when changes are made on the browser without being permitted.
Telecommuting
Telecommuting is when you employed but oyu work at home while communicating with the workplace using a phone or fax or modem.
Keyless entry system
A keyless entry system was designed to remotely permit or deny access to premices or automobiles.
Critical thinking
Critical thinking means determining the meaning of something that you observed or expressed.
Buisness-to-government
Buisness-to-government means companies that are marketing products and services to various governmetn levels.
Wildcard Character
A wildcard character is a character that may be subsituted for any of a defined subset of all possible characters.
Wiki
Wiki is a website that allows the easy creation of and editing of any number of interlinked web pages.
Monday, January 10, 2011
Peer-to-peer (P2P)
Peer-to-peer network are common in small offices, its a network of computers that allow certain files and folders to be shared with everyone or with selected users.
Subscribe to:
Comments (Atom)












