Printer-friendly version
Glossary for the entire site, across all courses and subjects.



Currently sorted By last update descending Sort chronologically: By last update change to ascending | By creation date

Page: (Previous)   1  2  3  4  5  6  7  8  9  10  ...  18  (Next)
  ALL

:

The protection of information assets through the use of technology, processes, and training.

Keyword(s):
:

Dreamweaver is the industry-leading web development tool, enabling users to efficiently design, develop and maintain standards-based websites and applications

Dreamweaver creates and maintaining basic websites to advanced applications that support best practices and the latest technologies.

http://www.macromedia.com/software/dreamweaver/

:

connecting poeple while they are on the computer and the earliest versions appeared in the late 1950s.

:

Privacy is the ability of an individual or group to keep their lives and personal affairs out of public view, or to stop information about themselves from becoming known to people other than those whom they choose to give the information.

Examples of Privacy:  Political privacyMedical privacyGenetic privacyPrivacy during an online job searchInternet PrivacyPrivacy from corporations and Privacy from government interference.

(taken from wikipedia.com)

:
A virus is a code which can either lie dormant in a computer and be not particualry harmful, but it can can also cause computers to shut down, lose of data, and even make the computer need to be reformatted. To prevent this Virus Protection has been created. There are many different programs for Virus protection or Anti-virus software, some working better than others, but the aim of all the programs is to protect your computer from harmful and useless virus's.
Keyword(s):
:

Sir Timothy "Tim" John Berners-Lee, (born June 8, 1955 in London) is the inventor of the World Wide Web and director of the World Wide Web Consortium, which oversees its continued development.

Keyword(s):
:

Encryption is the conversion of data into a form, called a ciphertext , that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

:

Dynamic HTML or DHTML is a method of creating interactive web sites by using a combination of static markup language HTML, a client-side scripting language (such as JavaScript), the presentation definition language (e.g. Cascading Style Sheets), and the Document Object Model.

INFO FROM: http://en.wikipedia.org/wiki/Dynamic_HTML

Keyword(s):
:

In general, testing is finding out how well something works. In terms of human beings, testing tells what level of knowledge or skill has been acquired. In computer hardware and software development, testing is used at key checkpoints in the overall process to determine whether objectives are being met.

http://searchvb.techtarget.com/sDefinition/0,290660,sid8_gci534970,00.html

:

Equity of access means that all people have the information they need-regardless of age, education, ethnicity, language, income, physical limitations or geographic barriers.

(taken from ALA)

:
A search engine is a program designed to help find information stored on a computer system such as the World Wide Web, inside a corporate or proprietary network or a personal computer.
Keyword(s):
:

A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority ( CA ). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key, and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.

Keyword(s):
:

Copyright is the ownership of an intellectual property within the limits prescribed by a particular nation's or international law. For example, the copyright law provides that the owner of a property has the exclusive right to print, distribute, and copy the work, and permission must be obtained by anyone else to reuse the work in these ways.

Keyword(s):
:
A server that sits between a client application , such as a Web browser , and a real server . It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
:

Data Integrity refers to the validity of data. It can be compromised in a number of ways.

(taken from webopedia)

Keyword(s):
:

Once a website has been completed, constant maintenance is needed to keep things running - especially if the website has dynamic content or if users are able to interact with the website. Depending ont the size and scale of the website, maintenance can be a full time job.

:
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
:
A proxy server is a computer network service which allows clients to make indirect network connections to other network services.
Keyword(s):
:
A dedicated gateway machine with special security precautions on it typically used to protect a network when it is connected to an outside network, especially the Internet.
Keyword(s):
:

Microsoft FrontPage is a powerful Web design software tool that is available at retail locations everywhere.


Page: (Previous)   1  2  3  4  5  6  7  8  9  10  ...  18  (Next)
  ALL