CS 160 RPSOLOMON

Home | Final Exam Online | About Our School | About our School | Directions | Links | Contact Us
Final Exam Online

 

.NET Frameworks
 
     The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large libra

     The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

     Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The CLR also provides other important services such as security, memory management, and exception handling. The class library and the CLR together compose the .NET Framework.

ASP - Active Server Pages

     Active Server Pages (ASP), also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).

     Developing rich functionality in ASP websites is enabled by the active scripting engine's support of the Component Object Model (COM), with each object providing a related group of frequently-used functions and data attributes.

     Most ASP pages are written in VBScript, but any other Active Scripting engine can be selected instead by using the @Language directive or the <script language="language" runat="server"> syntax. JScript (Microsoft's implementation of ECMAScript) is the other language that is usually available. PerlScript (a derivative of Perl) and others are available as third-party installable Active Scripting engines.

Access

     Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.

     Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, SharePoint lists, text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple applications. It supports some object-oriented techniques but falls short of being a fully object-oriented development tool.

Access privileges
 
     Determine which portal objects a user can browse or edit, which objects appear in search results, and which can be added to My Pages and community pages.

Active Hyperlink
 
     A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.

Administrator (as an IT resource)
 
     IT Resource Management allows organizations to analyze, monit IT Resource Management allows organizations to analyze, monitor and anticipate the utilization and performance of the IT infrastructure by providing an enterprisewide view of IT services and resources. The solution ensures delivery of IT services and resources in an efficient, cost-effective manner while demonstrating measurable value to business incentives.or and anticipate the utilization and performance of the IT infrastructure by providing an enterprisewide view of IT services and resources. The solution ensures delivery of IT services and resources in an efficient, cost-effective manner while demonstrating measurable value to business incentives.

Authentication

     (From Greek: αυθεντικός; real or genuine, from authentes; author). Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.

Data administrator
    
     The role responsible for the enterprise’s data resources and for the administration, control, and coordination of all data related analysis activities. The DA has the responsibility for planning and defining the conceptual framework for the overall data environment. The functions of the DA typically include requirements definition, logical data modeling, data definitions, logical to physical mapping, maintenance of inventory of the current system, data analysis, and the meta data repository.

Electronic commerce

     Electronic commerce is commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

Electronic Government (eGovernment)

     E-Government (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government.

Encryption
 
     Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption.

Information Technology

     Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Information Technology Resource (IT Resource)
 
     ITR (Information Technology Resources) is a Veteran owned Technical consulting and recruiting firm focused on the Information Technology Industry.

Intellectual property rights (IPR)

     Intellectual property rights (IPR), very broadly, are rights granted to creators and owners of works that are the result of human intellectual creativity. These works can be in the industrial, scientific, literary or artistic domains. They can be in the form of an invention, a manuscript, a suite of software, or a business name, as examples.

ISO

     ISO 17799 is a 'code of practise', meaning that it lists a substantial number of specific security controls that may be applicable to an IT environment. Selection from these controls is normally performed via risk assessment, and the methods outlined within ISO 27001.

Malicious code

     Malicious code ( is also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.

 

Malware (virus) Detection Software

      Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.  The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

      Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.

      Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.

Patch

     Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related different program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.

 

Purge
 
 
     In history and political science, a purge is the removal of people who are considered undesirable by those in power from a government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known as rehabilitation.

Remote Access
 

     In telecommunication, the term remote access has the following meanings:

  1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
  2. Remote desktop software
  3. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
  4. RemoteAccess is also the name of a DOS-based BBS software.

     Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote application (including remote browser).

Social Engineering

     Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.

Spoofing

     Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.

Strong Encryption

     Strong Encryption an encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.