Chapter 5: SMTPS (Simple Mail Transfer Protocol Secure) Correct
answers A
communications protocol used to send email across a network or
the Internet.
POP3 (Post Office Protocol version 3) Correct answers A standard for
retrieving email
messages from an email
server.
IMAP (Internet Message Access Protocol) Correct answers A protocol similar
to POP
that is used to retrieve email messages from an email server, but offers
additional
features, such as choosing which emails to download from
the server.
VoIP (Voice over Internet Protocol) Correct answers Hardware, software, and
protocols
used to make telephone-style calls over the Internet. Also referred to
as Internet
telephon
y.
Webmail Correct answers An email system that allows users to access email
messages
using a
browser.
Asynchronous Correct answers In the context of communications, such as
emailmessaging,
text and both parties need NOT be online at the
same time.
Synchronous Correct answers A communications mode, such as VoIP,
in which
participants MUST be online at the same
time.
Store-and-Forward Technology Correct answers A technology used by
communications
networks in which a message, such as an email, is temporarily held in
storageuntil
server on ait is requested by a client
computer.
RSS Reader Correct answers Software that can be used to set up and access
an RSS
feed
.
Public Domain Correct answers Material that is not subject to copyright
restrictions
its use and on
distribution.
Copyright Correct answers A form of legal protection that grants certain
exclusive
to rights
the work's creator or the owner of the
copyright.
Trademark Correct answers A logo symbol or word used to represent a
business.
Intellectual Property Correct answers A legal concept that refers to
ownership information,
intangible of such as
ideas.
, IP address Correct answers (Internet Protocol) One of the main protocols
of TCP/IP; for addressing packets so that they can be routed to their
responsible
destinations;
offers IPv4
32-bit addresses whereas IPv6 offers 128-bit
addresses.
Metadata Tag Correct answers Data that contains information about other
data;
are anfile tags of
example
metadata.
Hotspot Triangulation Correct answers The process of locating a device
based onfrom
distance its various hotspot
servers.
Chapter 6: User Interface Correct answers The software and hardware
that enable
people to interact with
computers.
Pirated Software Correct answers Software that is copied, sold, or
distributed without
permission from the copyright
holder.
Open Source Software Correct answers Software that includes its source
code, allowingto modify and
programmers
improve it.
Executable File Correct answers A file, usually with an .exe extension,
containing
instructions that tell a computer how to perform a
specific task.
EULA (End User License Agreement) Correct answers A type of software
license that
appears on the computer screen when software is being installed and
prompts
to acceptthe or user
decline.
Portable Software Correct answers Software designed to be stored on a
flash
CD and drive
doesor not require installation before it
is used.
Local Application Correct answers Software that is stored on a local device
and loaded
from there into RAM when it
runs.
Server Operating System Correct answers A type of operating system,
sometimes
called a network operating system, that provides management tools for
distributed
networks, email servers, and Web hosting
sites.
Kernel Correct answers The core module of an operating system that
typically manages
memory, processes, tasks, and storage
devices.
Buffer Correct answers Memory that is temporarily used to store input or
other
the data until
processor is ready to
use it.
Memory Leak Correct answers An undesirable state in which a program
requests
memory but never releases it, which can eventually prevent other
programs from
runnin
g.