Key Terms for Test 2

1.SEO (search engine optimization): a methodology of strategies, techniques, and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page
2.Hosting: a computer that acts as a server for other computers on a network.
3.E-commerce platform: a complete online store application that includes navigation, search, user accounts, shopping cart, and ordering capabilities
4.E-commerce shopping cart: a shopping cart is a piece software on a web server that allows visitors to an Internet site to select items for eventual purchase
5.Pop-up: A type of window that appears on top of (over) the browser window of a Web site that a user has visited.
6.Flash: used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity.
7.Link navigation: The basic form of navigating through the pages of a wiki, is to follow the page links.
8.Blog: a Web page that serves as a publicly accessible personal journal for an individual
9.Ad banner: a form of advertising on the World Wide Web delivered by an ad server. tracking analytics:
11.CRM (customer relationship management): The principles, practices, and guidelines that an organization follows when interacting with its customers.
12.Algorithm: a formula or set of steps for solving a particular problem.
13.Keywords: words or phrases that describe content.
14.Backlink: a backlink is an incoming link from an external website to specific webpage.
15.SERP rank: short for search engine results page, refers to where a website or webpage is ranked within search engine results
16.Conversions: The exchange of a convertible type of asset into another type of asset, usually at a predetermined price, on or before a predetermined date.
17.Open source: whena software program is open source, it means the program’s source code is freely available to the public.
18.CMS (content management system): a software application used to upload, edit, and manage content displayed on a website.
19.Native app: an executable program coded in the machine language of the hardware platform it is running in.
20.Mobile app: a software application that runs in a smartphone, tablet or other portable device.
21.Responsive design: Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.
22.API (application programming interface): is the specific method prescribed by a computer operating system or by an application program by which a programmer writing an application program can make requests of the operating system or another application.
23.Web server: are computers that deliver (serves up) wepages.
24.Web client: the client, or user, side of the web. It typically refers to the web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site.
25.Web browser: the application program that serves as the primary method for accessing the World Wide Web, one of the major services on the Internet.
26.Cookies: a small text file created by a website you visit that is stored on your computer either temporarily for that session only or permanently on the hard disk. Cookies provide a way for the website to recognize you and keep track of your preferences.
27.Search engine: software that looks for data that match the criteria in a query.
28.VOIP (voice over internet protocol): a technology or set of standards for delivery of telephone calls and other voice communications over the internet, involving conversion of analog voice signals to digital form.
29.HTML (hypertext markup language): is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.
30.HTTP (hypertext transfer protocol): is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.
31.Payment gateway: a means of authorizing credit card or other forms of electronic payments.
32.SSL certificate: are small data files that digitally bind a cryptographic key to an organization’s details.
33.AVS (address verification service): a tool provided by credit card processors and issuing banks to merchants in order to detect suspicious credit card transactions.
34.Digital signature: is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
35.DRI (digital receipt infrastructure): enables consumers and organizations to prove that electronic transactions and events actually took place. In legal terms, these serve as a digital trail, as opposed to a paper trail.


Additional Key Terms.


  1. Malware – any form of malicious code (viruses, worms, etc.)
  2. Virus – a program that has the ability to make copies of itself and spread to additional files.
  3. Worms – malware that is designed to spread from computer to computer.
  4. Trojan horses – Code that appears benign but does something other than what is expected.
  5. Drive-by downloads – malware that comes with a requested download.
  6. Backdoors – a feature of malware that allows attackers to remotely access computers.
  7. Bots, botnets – code that responds to external commands sent by an attacker. A botnet is a collection of “captured” computers.
  8. Potentially Unwanted Programs – (PUP) programs that install themselves without the user’s consent.
  9. Phishing – deceptive online attempts to obtain confidential information for financial gain.
  10. Hacker/cracker – an individual who intends to gain unauthorized access to a computer system. “Cracker” dnotes a hacker with malicious intent.
  11. Cybervandalism – intentionally disrupting, defacing, or destroying a website.
  12. Hacktivism – cybervandalism and data theft for political purposes.
  13. Spoofing – hiding one’s identity by using someone else’s email address or IP address.
  14. Pharming – automatically redirecting a web link that is different from the intended one; the fake site looks identical to the intended site.
  15. Spam (Junk) Web Sites – also called “link farms”; attract users with a promise of goods or services but are just collections of advertisements.
  16. Denial of Service (DoS) Attacks – flooding a website with useless traffic to overwhelm the network.
  17. Distributed Denial of Service (DDoS) Attacks – using numerous computers to attack the target from numerous launch points.
  18. Sniffer – an eavesdropping program that monitors information travelling over a network.
  19. Public key encryption – (see notes) Public key cryptography solves the problem of exchanging keys by creating a mathematically related public key and private key.
  20. Symmetric key encryption – both the sender and receiver use the same key to encrypt and decrypt a message.
  21. SSL/TLS (secure negotiated session) – a client-server session which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted.
  22. Firewalls – refer to either hardware or software that filter communication packets and prevent packets from entering the network based on a security policy.
  23. Proxy servers – software servers that handle all communications originating from or being sent to the Internet.
  24. Nonrepudiation – the ability to ensure that e-commerce participants do not deny their actions online




Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s