You are on page 1of 2

REVIEWER FOR TLEEX101 – INTRO TO ICT….

HINDI PO ITO KODIGO


1. The Internet define as a worldwide network connecting to a million of computers via dedicated
routers and servers.
2. Internet2 – is a not-for-profit networking consortium founded in 1996 by 34 university research
institution in the US.
3. World Wide Web (WWW) – is referred to as the collection of public websites that are connected to
the internet worldwide.
4. Web servers and web browsers - is software applications for recovering, presenting, and navigating
information resources on the World Wide Web.
5. Circuit switching – is the method of linking the telephones together and one of the most common
schemes utilized to build a communication network.
6. Packet Switching – a mode of transmission in which the message is broken into smaller parts called
packets which are sent independently and then reassemble at the ultimate destination.
7. Server is a computer that is designed to process any request for data and delivers data to other
clients computers
8. Client is a computer or device that gets information from a server.
9. File server is machine that holds and manages documents
10. Web Server II - one that holds users email services and Web services.
11. Print Server is device that connects printers to cline computer through Internet.
12. Router is device designed to receive, analyze, and send incoming packets to another network.
13. Copyright - is the exclusive right given to the creator of a creative work to reproduce the work,
usually for a limited time.
14. Patent – is set of exclusive rights granted by a state to an inventor for limited period of time in
exchange for the public disclosure of an invention
15. Trademark – is a distinctive sign used by an individual, business organization, or other legal entity to
identify the products or services to consumers.
16. Trade Secret – is the term used for any method, formula, device, process, or any information that
gives the business a unique competitive advantage over its competitions
17. Temperature Sensor – a sensor capable of measuring temperature as well as detecting its rise and
fall.
18. Infrared (IR) Sensor – a sensor often used for security purposes and detects infrared lights.
19. Ultrasonic Sensor – detects sound waves, such as how radars and sonars pick-up sounds.
20. Touch Sensor – is a sensor that activates itself and becomes capable of doing its functions.

21. Proximity Sensor – a sensor that is able to detect objects within a certain range, even if the object is
not physically touching the sensor yet.
22. Pressure Sensor – a sensor that helps determine the weight or impact of a certain object.
23. Level Sensor – a sensor that can detect the level of liquids, fluids, grainy or granular materials.
24. Smoke/Gas Sensor – a sensor that is used to detect the presence of dangerous fumes such as
carbon monoxide caused by fire.
25. Malware – is a general term used to describe any type of software that can cause harm to a
computer system.
26. Virus – is a computer program usually hidden within another program that inserts itself into other
programs or files.
27. Worm – is a stand-alone malware that replicates itself in order to spread to other computers,
28. Trojan – refers to a malicious program which initially appears to be useful, routine, or interesting in
order to persuade a victim to install it.
29. Spyware – is a software that aims to gather information about an organization or a person without
his or her knowledge.
30. Ransomware – a type of malware that can block access to a victim’s data.
31. Adware – is a program designed to display advertisements on the computer, redirect search request
to advertising websites, and collect marketing-type data about the customer.
32. Freeware – an ad-supported programs, games or utilities that are distributed as adware.
33. Cyberbullying – is an unwanted, hostile behavior done by individuals to other people in the hope of
gaining control over them in the internet.
34. Internet profile – is a profile created by internet users to establish their social identity in online
communities, social media sites, and other websites.
35. Netiquette - is a combination of the words internet and etiquette and describes how one should act
online.
36. Hacker – uses his or her technical knowledge or skills to gain unauthorized access to data or
systems.
37. Hypertext markup language (HTML) - is a standard markup language used for creating web pages.
38. Hypertext transfer protocol (HTTP) - is classified as the set of standards allowing users of World
Wide Web to interchange information seen on web pages.
39. Mobile Commerce M-Commerce – is the delivery of electronic commerce capabilities directly into
the consumer’s hand, anywhere, via wireless technology
40. Uniform Resource Locator (URL) – is one of the most important terms in the web which is sorted as
the internet address.

True or False

Most useful Google search tricks release in 2016


Techniques Designed to Control Access and Reproduction of Online Information
Types of Intellectual Property Rights
Netiquette for Social Media
Common Methods of Implementing IT Automation

You might also like