ISTM 210 Exam 2 - Questions and Answers Internet Service Provider (ISP) business or organization that provides people with a way to access the internet
... [Show More] and world wide web Digital Subscriber Line (DSL) provide services such as domain name registration and web hosting Broadband high data-transmission rate internet connection Internet hosting services run internet servers to serve content like web pages to internet to clients Web hosting common kind of hosting Keyword search engines only require keywords or phrases Metaseach engines look and work like keyword searches but return results of many search engines at once and eliminate duplicate hits Electronic commerce distributing, buying, selling, advertising, and marketing of goods and services over the web Business to business (B2B) business distributing, buying, etc over the web to other business, ex: bulk buying medical products Business to Consumer (B2C) commercial organizations sell to consumers over the web, ex: overstock.com Consumer to Consumer (C2C) involves e-commerce between individuals and is typically facilitated by a third party, ex: eBay.com Market research who is your customer? Who are your competitors? What's your product? Streamlines Business Process e-commerce demands that a business investigate how it does on the web Agility often brick and mortar businesses may realize that they must update their storefronts, but time constraints and costs may keep them from doing so Browser hijacking can be described as when the browser's settings are modified by malware Malware software designed to damage a computer system without the owner's knowledge Virus malicious computer program that can copy itself and infect a computer, typically without the user being aware Worm like a virus that in that spreads quickly and is extremely harmful but it does not need to attach itself to an existing program Trojan horse usually harmless or interesting looking program, when executed unleashes harmful viruses into a user's system Spyware best defined as software that installs itself on a user's system without permission and gleans personal data and information about the user without their knowledge or permission Adware software that routinely displays advertising to a computer system after the software is installed, usually without the user's consent Email addresses is a store and forward system of composing, sending, storing, and receiving messages over electronic communication system like the internet Carbon Copy email offers include ability to copy more than one recipient by using the CC option, lets them know who also received the email Blind Carbon Copy works the same way as CC but doesn't let all recipients know who else got the email Terms of service agreement (TOS) specifically outlines email usage and protocols [Show Less]