







































1. Indexes- it is contents in a computer.
2. Keywords- it is used to program language.
3. Libel- it damages a person's reputation in writings, pictures and prints.
4. Link List- it is an alliance of websites that performs similar to a web ring.
5. Math symbols- these are used in mathematics.
6. News Feed- it is an information used to update content.
7. Peer-to-Peer (P2P)- it is an application used to distribute work loads between peers.
8. Phrase Searching- it is used in documents that has a specific phrase.
9. Plagiarism- it means to copy somebody else's work.
10. Podcatcher- it is use to download media such as RSS or XML feed.
11. Public Domain- it is used to see if property rights are expired.
12. Related Search- it is used to search images on a word.
13. Search Engine- it is a software program that seeks a database and puts together and reports info that holds or it is related to specified terms.
14. Shared Bookmark- it is a method used for the Internet users to searh for bookmarks.
15. Trademark- name that a company would go by.
16. Wiki- it is a website that allows the development and editing of any number of a web browser.
17. Wildcard Character- it is a character that may be substituted of all likely characters.
18. Business-to-Business (B2B)- it is transactions between businesses.
19. Business-to-Consumer (B2C)- it describes activities of business helping end consumers with products.
20. Business-to-Government (B2G)- it is many times referred to as public sector marketing.
21. Critical Thinking- it is a reflective judgment on what to believe or what to do.
22. Digital Cash- it is cash exchanged electronically.
23. Electronic Commerce (e-commerce)- it is when you are buying and selling products over electronic systems.
24. Keyless Entry System- it is used to decline access automobiles.
25. Online Learning- it is used to teach and learned electronically.
26. Telecommunicating- it is when you send information over distances for the meaning of communication.
27. Browser hijacking- it is the adjustment of a web browser's settings by malware.
28. Brute Force Attacks- it is used to encrypt data.
29. Hacking- it is when someone is using a computer system unauthorized properly.
30. Hardware Firewall- it is part of a computer system to block authorized communications.
31. Keylogger- it is when you follow the keys struck on a keyboard.
32.Private Key- it is a cryptographic which uses asymmetric key formulas.
33. Public Key- it is a class of algorithms on cryptography.
34. Repetitive strain Injury- it is an injury of the muscular system and the nervous systems because of vibrations.
35. Secure Lockets Layer (SSL)- it is a protocol that provides giving security over the internet.
36. Sniffer- it is a computer hardware that intercepts digital network.
37. Spyware- it is a kind of malware that could be installed on computers.
38. Strong Password- it is a measure of the effects of a password.
39. Transport Layer Security (TLS)- it is a security protocol.
40. IC3 Certification Exam- it is a trademark and abbreviation of the "Internet and Computing Core Certification."
No comments:
Post a Comment