INSY 2303 Exam 2 UTA

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

Social Media

Get a hint
Hint

Online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio

Get a hint
Hint

Social Media Honeycomb

Get a hint
Hint

Provides a visual model for classifying and comparing various social media services

Card Sorting

1/105

Anonymous user
Anonymous user
encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

106 Terms

1
New cards

Social Media

Online services that facilitate communication and interaction among people who want to share information about their lives, issues, and events using a multimedia mix of text, pictures, video, and audio

2
New cards

Social Media Honeycomb

Provides a visual model for classifying and comparing various social media services

3
New cards

4 groups of social media

1. Social Networking

Ex. Facebook

2. Geosocial networking

Ex. Google Maps

3. Content communities

Ex. Youtube, Instagram

4. Online communities

Ex. Snapchat, Tumblr

4
New cards

Online Identity

A persons presence on a social media service

5
New cards

Social Media Profile

the set of information provided to friends, contacts, and the public

6
New cards

Geosocial Networking

Provides a platform for users to carry out interactions based on their current locations

7
New cards

Social Discovery

uses geolocation to meet with people who are nearby and have similar interests

8
New cards

Crowdsourcing

When individuals contribute computer time, expertise, opinions, or money to a defined project

9
New cards

4 ways the location of a device can be determined

1. GPS trilateration

2. Cell tower triangulation

3. Hotspot triangulation

4. IP address lookup

10
New cards

Content Community

Focus on text-based information, or their focus may be on other media, such as photos, music, or video

11
New cards

Metadata Tag

A keyword that describes information, such as the content of a media element

12
New cards

Formal Tagging

Add information to a tag according to a set of tagging standards

13
New cards

Intellectual Property

All of the creations that materialize from the mind or intellect

14
New cards

Trademark

any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another

15
New cards

Copyleft

designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license

16
New cards

Fair use and 4 factors

- Allows for the limited use of copyrighted material without obtaining permission from the copyright holder

1. The purpose and character of the use

2. The nature of the copyrighted work

3. The amount of the copyrighted work that is used

4. The effect on the value of the copyrighted work

17
New cards

Blog

similar to an online diary; it is maintained by a person, company, or an organization, and it contains a series of entries on one or more topics

18
New cards

RSS reader and blog aggregator

a "feed" that monitors your favorite blogs, collects the latest posts, and displays them

19
New cards

Microblogs

a short blog post

Ex. A tweet

20
New cards

Wiki

a collaborative web application that provides tools that enable contributors to post, read, and modify content

21
New cards

Email Message

electronic document transmitted over a computer network

22
New cards

Email server

a computer that essentially acts as a control post office for a group of people

23
New cards

Standard Format of email messages

consists of a message header and the message body

24
New cards

Store-and-forward technique

When you use local email, an internet based email server stores your incoming messages until you launch your email client and get your mail

25
New cards

Instant Messaging

a synchronous, real-time technology for two or more people to type messages back and forth while online

26
New cards

Online Identities

Nearly 40% of all online identities are fake

27
New cards

Sockpuppets

any online identity created and used for purposes of deception

28
New cards

Online Reputation

impression that is generated by an online persona

29
New cards

Doppelgangers

2 or more online personas with the same name or username

30
New cards

Privacy

the right to be left alone

31
New cards

Executable File

Contains a computer program that is carried out step-by-step within the microprocessor

32
New cards

System requirements

specify the operating system and minimum hardware capacities necessary for a software product to work correctly

33
New cards

Software Upgrade

When a new version or edition of a software product is released

34
New cards

Software Update

a small section of program code that replaces part of the software currently installed

35
New cards

Service Pack

refers to a set of updates

36
New cards

Software pricing models

1. One-time purchase: the software remains the same as when it was purchased

2. Subscription: consumers pay an annual fee to use software

3. Trial: consumers use a software product during a free trial period

4. Freemium: provides free use of a stripped down or basic version of the product but requires payment for upgrades

37
New cards

Software License

a legal contract that defines the ways in which a computer program may be used

38
New cards

Operating system

gives your digital device a personality

39
New cards

Operating system categories

Desktop, mobile, server

40
New cards

Kernel

provides the essential operating system services, such as memory management and file access

41
New cards

Resource

refers to any component that is required to perform work

42
New cards

Multitasking

provides process and memory management services that allow 2 or more tasks to run simultaneously

43
New cards

Multithreading

allows multiple commands, or threads to run simultaneously

44
New cards

Multiprocessing

a capability that supports a division of labor among all the processing units

45
New cards

Memory leak

an application requests memory but never releases it

46
New cards

Buffers

collect and hold data while the device is busy with other tasks

47
New cards

Microsoft Windows

Installed on more than 80% of worlds PC's

48
New cards

Limitations of iOS

-Limits selection of apps to those provided by the app store

-Background processes, such as music, voice calls, and notifications, provide very limited multitasking capabilities

49
New cards

Android

mobile operating system that is a popular platform for tablet computers, smartphones, and ebook readers

50
New cards

Thin Client

depends substantially on processing and storage provided by a remote computer

51
New cards

Virtual machines

allows one computer to simulate the hardware and software of another

52
New cards

Web Apps

software that is accessed with a web browser

53
New cards

Examples of Web Apps

Popular web apps include: Gmail and google docs

Allow several people to collaborate on projects

54
New cards

Mobile Apps

designed for a handheld device such as a smartphone, tablet computer, or enhanced media player

55
New cards

Jailbreak

an unauthorized change to the devices software

56
New cards

Rooting

the process off making unauthorized modifications to any mobile device

57
New cards

Local Applications

installed on a computers hard disk

Ex. office suites, games, and professional software tools

58
New cards

Portable Software

designed for PC's and it runs from removable storage, such as a USB flash drive

59
New cards

Office Suite

collection of programs that typically include word processing, spreadsheet, and presentation modules

60
New cards

Spreadsheet

uses rows and columns of numbers to create a model or representation of a real situation

61
New cards

Automatic recalculation

when you change the contents of any cell in a worksheet, all the formulas are recalculated

62
New cards

Database

simply a collection of data that may be stored on one or more digital devices

63
New cards

Record

holds data for a single entity

64
New cards

Field

holds one item of data relevant to a record

65
New cards

Presentation Software

supplies tools for combining text, photos, clip art, graphs, animations, ad sound into a series of electronic slides that can be shown on a screen or projector

EX. Powerpoint

66
New cards

Computer File

a named collection of data that exists on a storage medium, such as a hard disk, cloud drive or USB flash drive

67
New cards

Device letter

storage devices where files can be saved

68
New cards

directory

contains a list of files

69
New cards

root directory

the main directory

70
New cards

file path

a computer file's location

71
New cards

File management utilities

File organization tools

72
New cards

Default application

software application associated with a specific file type

73
New cards

Ways of manipulating files and folders

1. Rename

2. Copy

3. Move

4. Delete

74
New cards

Encryption

transforms a message or data file in such a way that its contents are hidden from unauthorized readers

75
New cards

Authentication Protocols

Passwords, PINs, and fingerprint scanners

76
New cards

Brute force attack

uses password cracking software to generate every possible combination of letters, numerals, and symbols

77
New cards

Dictionary attack

helps hackers guess your password by stepping through a dictionary containing word lists in common languages

78
New cards

Password Manager

stores user IDs with their corresponding passwords

79
New cards

Malware

refers to any computer program designed to surreptitiously enter a digital device

80
New cards

Common classifications of malware

Viruses, worms, trojans

81
New cards

Computer virus

a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device

82
New cards

Code injection

the process of modifying an executable file or data stream by adding additional commands

83
New cards

Side-loading

an app from a source other than an official app store is installed on a device

84
New cards

Rootkit

Any code that is designed to hide the existence of processes and privileges

85
New cards

Computer Worms

self-replicating, self-distributing program designed to carry out an unauthorized activity on a victim's device

86
New cards

Trojan

computer program that seems to perform one function while actually doing something else

87
New cards

Dropper

designed to drop a malicious code into a device

88
New cards

Antivirus software

type of utility software that looks for and eliminates viruses, trojans, worms, and other malware

89
New cards

Online intrusion

takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerabilities in hardware or software

90
New cards

different types of intrusions

RATs, Ransomware, Botnets, Backdoor, DDoS

91
New cards

Zero-day attack

exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code

92
New cards

Netstat

produces a detailed list of open ports on a device

93
New cards

Firewall

a device or software that is designed to block unauthorized access while allowing authorized communications

94
New cards

Personal firewall

a set of rules to block data or allow it to enter a digital device

95
New cards

Spyware

any software that secretly gathers personal information without the victim's knowledge

96
New cards

Adware

monitors web-browsing activity to supply ad-serving sites with data used to generate targeted ads

97
New cards

Evil twins

a LAN server that is designed to look like a legitimate Wi-fi hotspot

98
New cards

Spam

defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems

99
New cards

Phishing

an email scam that masquerades as a message from a legitimate company or agency of authority; goal is to obtain private information

100
New cards

Pharming

redirects website traffic to fraudulent websites that distribute malware and collect personal data