MIS Chapters 4-8; Alice 3 Chapters 4-6

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Internet

A worldwide collection of millions of computers and networks of all sizes; a network of networks.

2
New cards

Hypertext / Hypermedia

Documents that include links to text, images, audio, or video.

3
New cards

Internet Backbone

The main high-speed fiber-optic network connecting major routers and data centers.

4
New cards

HTML Tags

Define the structure and appearance of a webpage.

5
New cards

HTML Attribute

Specifies a value like font color for a page component.

6
New cards

Podcast

An audio file posted online for download or streaming.

7
New cards

Internet Telephony (VoIP)

Using the Internet instead of phone lines for voice calls.

8
New cards

Intranet

A private internal network that uses Internet technologies.

9
New cards

Email

A system for sending electronic messages over the Internet; one of the most widely used services.

10
New cards

Blog

An online journal or newsletter that is updated frequently.

11
New cards

Phishing

Sending fake emails pretending to be legitimate sources to steal information.

12
New cards

Pharming

Redirecting users to fake websites to steal their information.

13
New cards

Spoofing

Pretending to be an authorized user to gain access or steal data.

14
New cards

Spyware

Software that secretly gathers information about users.

15
New cards

Adware

Spyware that collects data to display targeted ads.

16
New cards

Worm

Self-replicating malware that spreads through networks without user action.

17
New cards

Virus

A self-propagating program that attaches to files and spreads when opened.

18
New cards

Backdoor

A hidden access point built into a system by its creator.

19
New cards

Denial-of-Service (DoS) Attack

Flooding a system with requests to make it crash or shut down.

20
New cards

Social Engineering

Using people skills to trick users into revealing private information.

21
New cards

Logic Bomb

Code hidden in a system that activates under specific conditions.

22
New cards

Firewall

Hardware or software that protects a network by blocking unauthorized access.

23
New cards

Intrusion Detection System (IDS)

Software that monitors network traffic and alerts administrators of attacks.

24
New cards

Data Encryption

A method that turns readable data into scrambled ciphertext.

25
New cards

Biometric Security

Verification based on physical traits like fingerprints or facial recognition.

26
New cards

UPS (Uninterruptible Power Supply)

A backup power unit that prevents data loss during outages.

27
New cards

Keystroke Logger

A program that records keyboard input.

28
New cards

RAID / Mirror Disks

Storage systems that keep data secure and prevent data loss.

29
New cards

Nonrepudiation

Ensures all parties in a contract or communication cannot deny their involvement.

30
New cards

Intellectual Property

Legal protections for creative or original works such as inventions or art.

31
New cards

Accountability

Responsibility for actions and data use.

32
New cards

Acceptable Use Policy

Rules that define ethical and legal use of systems and data.

33
New cards

Virtual Organization

A network of companies that share resources online.

34
New cards

Digital Divide

The gap between people who have access to technology and those who do not.

35
New cards

Spam

Unsolicited advertising emails.

36
New cards

Log Files

Records of user actions and system activity on a server.

37
New cards

Corner Bolts

Physical network security measures that prevent tampering with equipment.

38
New cards

Data Communication

The electronic transfer of data between locations.

39
New cards

Bandwidth

The amount of data that can be transferred per second.

40
New cards

Throughput

The actual rate of data transfer achieved.

41
New cards

Protocols

Rules that govern how data is transmitted across networks.

42
New cards

OSI Model

A seven-layer framework describing how data is transmitted between devices.

43
New cards

LAN (Local Area Network)

A network that connects nearby computers and devices.

44
New cards

WAN (Wide Area Network)

A network that covers a large geographic area.

45
New cards

Bus Topology

A network setup where all devices share one central cable.

46
New cards

Ring Topology

A network where each device is connected in a closed loop.

47
New cards

Star Topology

A network where all devices connect to a central hub or computer.

48
New cards

Router

A device that directs data between different networks.

49
New cards

Attenuation

Signal power loss over distance.

50
New cards

Broadband

A high-speed connection that sends multiple data streams at once.

51
New cards

DSL (Digital Subscriber Line)

A broadband connection using telephone lines.

52
New cards

Alice Object

A 3D model or character that can be programmed to perform actions.

53
New cards

Alice Method

A command that makes an object perform an action.

54
New cards

Parameter

An extra piece of information passed to a method to control how it runs.

55
New cards

Class (in Alice)

A blueprint or category that defines objects with similar properties and methods.

56
New cards

Instance (in Alice)

A specific version of a class object in the Alice world.

57
New cards

Procedure

A method that performs an action but doesn’t return a value.

58
New cards

Function

A method that performs a calculation and returns a value.

59
New cards

Alice Gallery

Provides 3D models that can be added to the scene.

60
New cards

Code Editor

Allows you to build and edit programs using drag-and-drop blocks.

61
New cards

Scene Editor

Used to set up and arrange objects in the world visually.

62
New cards

Storyboard

A visual plan that outlines what happens in an animation or program.

63
New cards

Built-in Method

A method that comes with an object by default.

64
New cards

Custom Method

A method created by the user to define new behavior.

65
New cards

Control Structure

A block that controls the order in which instructions are executed.

66
New cards

Do Together

Runs multiple actions at the same time.

67
New cards

Do In Order

Runs actions one after another in sequence.

68
New cards

Loop

Repeats a section of code a specific number of times.

69
New cards

Event

A trigger that starts an action when something happens, like a key press or mouse click.

70
New cards

Nesting

Placing one control structure inside another.

71
New cards

Variable

A named container used to store data that can change while the program runs.

72
New cards

Global Variable

A variable that can be used anywhere in a program.

73
New cards

Local Variable

A variable that can only be used inside a specific method.

74
New cards

Comment

A note left in code to explain what it does.

75
New cards

World (in Alice)

The environment that contains all objects and the camera.

76
New cards

Camera (in Alice)

Defines the viewpoint for the scene or animation.

77
New cards

Pose (in Alice)

The saved position and orientation of an object.

78
New cards

Billboard Object

A flat image that always faces the camera.

79
New cards

Inheritance

When an object inherits properties and methods from its class or parent.

80
New cards

3D Object

An object that has depth, width, and height.

81
New cards

2D Object

A flat object like a picture with only width and height.

82
New cards

Function (Alice Use)

Calculates and returns information like distance or position.

83
New cards

Parameter (Alice Use)

Makes methods reusable and flexible by allowing user input.

84
New cards

Event Listener

A block that waits for an event and triggers code when it occurs.

85
New cards

Debugging

Finding and fixing errors in code or animation.