CIS 101: Final Exam Review
CIS 101: Final Exam Review CIS 101
Popular in Introduction to Computing
Popular in ComputerScienence
This 2 page Study Guide was uploaded by Melissa Cirasella on Friday September 18, 2015. The Study Guide belongs to CIS 101 at Pace University taught by Andrea Taylor in Fall 2012. Since its upload, it has received 21 views. For similar materials see Introduction to Computing in ComputerScienence at Pace University.
Reviews for CIS 101: Final Exam Review
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 09/18/15
CIS 101 Final Review ltbrgt speci es text to appear in bold End bold text ltagt ltagt anchor creates a hyperlink or fragment identi er ltbodygt ltbodygt de nes the start and end of a Webpage s content ltheadgt ltheadgt delimits the start and end of the HTML document s head lthtmlgtlthtmlgt indicates the start and end of the HTML document ltligtltligt indicates the enclosed text as a list item in a list ltpgtltpgt delimits a paragraph automatically inserts a blank like between text Body contains the information that is displayed in the browser window First part cookie created from the Web site that a user is currently viewing Third party cookie not created by the Web site that attempts to access the cookie Home page start page Web page that opens each time the Internet starts html Hypertext Markup Language allows web authors to combine text graphic images audio video and hyperlinks into a single document Hyperlinks a notation in HTML that allows users to jump from one area on the Web to another with the click of the mouse button Identity theft using someone s personal information such a social security number to establish bank or credit card accounts that are then left unpaid leaving the victim with debts and ruining their credit rating ltimggt inserts an image into the current Web page Information security the tasks of guarding information that is in a digital format Which protects the integrity con dentiality and availability of information on the devices that store manipulate and transmit the information through products people and procedures Internet a worldwide interconnected set of computers servers and networks Key logging a small hardware device or program that monitors each keystroke a user types in the computers keyboard Logic bomb a computer program or a part of a program that lies dormant until its triggered by a speci c logical event Network A network is a group of two or more computer systems linked together LAN local area network A computer network that has all of the computers locate relatively close to each other WLAN wireless local area network A wireless network based on a protocol that transmits data at fast speeds over a distance of up to 375 ft 115 meters ltolgt ltolgt de nes a ordered list that contains numbered list item elements ltligt 123ABC Password a secret combination of letters numbers andor characters that serves to authenticate a user Password guessing a method of gaining unauthorized access to a computing system by using computers and dictionaries or large word lists to try likely passwords Phishing sending an email or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information Social engineering relying on deceiving someone to obtain secure information Spam unsolicited email Spyware a general term used to describe software that violates a users personal securty Malware malicious software Tables allow you to organize information on a Web page using HTML tags HTML tag mark the text to de ne how it should appear when viewed as a web page HTML element includes headings paragraphs hyperlinks lists and images and consists of 3 parts a start tag content and an end tag Attribute de ne additional characteristics such a font weight or style for the HTML tag ltulgt ltulgt de nes an unordered list that contains bulleted list item elements ltligt circle disc square url Uniform Resource Locators Viruses a program that secretly attaches itself to a document or program and then executes when that document is open or program is launched Web browser displays the HTML code on the computer screen Web site World Wide Web WWW a system of internt server computers that provide online information in a speci c format Worm a program that is designed to take advantage of vulnerability in an application or an operating system in order to enter a system
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'