2 markers misc

Upload: akhil-srivastava

Post on 03-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 2 Markers Misc

    1/21

    Cyber-terrorism is the leveraging of a target's computers and information technology,particularly via the Internet, to cause physical, real-world harm or severe disruption.

    Cyberterrorism can have a serious large-scale influence on significant numbers of people.Cyberterrorism can weaken countries economy greatly, by doing this it can strip the

    country of its resources and make it more vulnerable to military attack.

    Other effects are the loss of revenue for Internet based sites such as Yahoo! and eBay.

    Both these sites work on a time is money concept whereby each second these sites areshut down they lose more and more potential customers.

    Bluetooth is an industrial specification for wireless personal area networks (PANs).Bluetooth provides a way to connect and exchange information between devices such as

    mobile phones, laptops, PCs, printers, digital cameras, and video game consoles over asecure, globally unlicensed short-range radio frequency. The Bluetooth specifications are

    developed and licensed by theBluetooth Special Interest Group.

    Wi-Fi is a wireless technology brand owned by the Wi-Fi Alliance intended to improvethe interoperability of wireless local area network products based on the IEEE 802.11standards. "Wi-Fi" is mistakenly thought to be derived from "Wireless Fidelity", as the

    Wi-Fi Alliance used this term in some of its early press releases.[1] However this is

    incorrect, as the term has no meaning.[2]

    Common applications for Wi-Fi include Internet and VoIP phone access, gaming, andnetwork connectivity for consumer electronics such as televisions, DVD players, and

    digital cameras.

    Bluetooth differs from Wi-Fi in that the latter provides higher throughput and coversgreater distances, but requires more expensive hardware and higher power consumption.They use the same frequency range, but employ different multiplexing schemes. While

    Bluetooth is a cable replacement for a variety of applications, Wi-Fi is a cable

    replacement only forlocal area networkaccess. Bluetooth is often thought of as wirelessUSB, whereas Wi-Fi is wireless Ethernet, both operating at much lower bandwidth than

    the cable systems they are trying to replace. However, this analogy is not entirely

    accurate since any Bluetooth device can, in theory, host any other Bluetooth devicesomething that is not universal to USB devices, therefore it would resemble more a

    wireless Firewire.

    WiMAX, the Worldwide Interoperability for Microwave Access, is atelecommunications technology aimed at providing wireless data over long distances in avariety of ways, frompoint-to-point links to full mobile cellular type access. It is based

    on the IEEE 802.16standard, which is also called WirelessMAN. WiMAX allows a user,

    for example, to browse the Interneton a laptopcomputer without physically connectingthe laptop to a router, hub or switch via an Ethernet cable. The name WiMAXwas created

    by the WiMAX Forum, which was formed in June 2001 to promote conformance and

    interoperability of the standard. The forum describes WiMAX as "a standards-based

    http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Mobile_phoneshttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Computer_printerhttp://en.wikipedia.org/wiki/Digital_camerahttp://en.wikipedia.org/wiki/Video_game_consolehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Bluetooth_Special_Interest_Grouphttp://en.wikipedia.org/wiki/Bluetooth_Special_Interest_Grouphttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi#_note-0%23_note-0http://en.wikipedia.org/wiki/Wi-Fi#_note-1%23_note-1http://en.wikipedia.org/wiki/Wi-Fi#_note-1%23_note-1http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Video_gamehttp://en.wikipedia.org/wiki/Consumer_electronicshttp://en.wikipedia.org/wiki/Televisionshttp://en.wikipedia.org/wiki/DVD_playerhttp://en.wikipedia.org/wiki/Digital_camerahttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Frequency_rangehttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/USBhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Firewirehttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Point-to-pointhttp://en.wikipedia.org/wiki/IEEE_802.16http://en.wikipedia.org/wiki/IEEE_802.16http://en.wikipedia.org/wiki/WirelessMANhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/WiMAX#WiMAX_Forum%23WiMAX_Forumhttp://en.wikipedia.org/wiki/WiMAX#WiMAX_Forum%23WiMAX_Forumhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Mobile_phoneshttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Computer_printerhttp://en.wikipedia.org/wiki/Digital_camerahttp://en.wikipedia.org/wiki/Video_game_consolehttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Bluetooth_Special_Interest_Grouphttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi#_note-0%23_note-0http://en.wikipedia.org/wiki/Wi-Fi#_note-1%23_note-1http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Video_gamehttp://en.wikipedia.org/wiki/Consumer_electronicshttp://en.wikipedia.org/wiki/Televisionshttp://en.wikipedia.org/wiki/DVD_playerhttp://en.wikipedia.org/wiki/Digital_camerahttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Frequency_rangehttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/USBhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Firewirehttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Point-to-pointhttp://en.wikipedia.org/wiki/IEEE_802.16http://en.wikipedia.org/wiki/WirelessMANhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/WiMAX#WiMAX_Forum%23WiMAX_Forum
  • 7/28/2019 2 Markers Misc

    2/21

    technology enabling the delivery oflast mile wireless broadband access as an alternative

    to cable and DSL."WiBro (Wireless Broadband) is a wireless broadband Internet technology beingdeveloped by the South Koreantelecoms industry.

    An exabyte (derived from the SI prefixexa-) is a unit ofinformation orcomputer storageequal to one quintillionbytes. It is commonly abbreviated EB.

    A computer virus is a computer program that can copy itself and infect a computerwithout permission or knowledge of the user. A virus can only spread from one computer

    to another when its host is taken to the uninfected computer, for instance by a user

    sending it over a network or the Internet, or by carrying it on a removable medium such

    as a floppy disk, CD, or USB drive. Viruses are sometimes confused with computerworms andTrojan horses. A worm can spread itself to other computers without needing

    to be transferred as part of a host, and a Trojan horse is a file that appears harmless until

    executed.

    Some viruses are programmed to damage the computer by damaging programs, deleting

    files, or reformatting the hard disk. Others are not designed to do any damage, but simply

    replicate themselves and perhaps make their presence known by presenting text, video, or

    audio messages. Even these benign viruses can create problems for thecomputer user.They typically take up computer memory used by legitimate programs. As a result, they

    often cause erratic behavior and can result in system crashes. In addition, many viruses

    arebug-ridden, and these bugs may lead to system crashes and data loss.

    Remedy:

    install anti-virus software that can detect and eliminate known viruses after thecomputerdownloadsor runs the executable.------- making regularbackupsof data (and

    the Operating Systems) on different media, that are either kept unconnected to the system(most of the time), read-only or not accessible for other reasons, such as using different

    file systems.--------- use different Operating Systems on different file systems. A virus is

    not likely to affect both.

    A computer worm is a self-replicating computer program. It uses a network to sendcopies of itself to other nodes (computer terminals on the network) and it may do so

    without any user intervention. Unlike a virus, it does not need to attach itself to an

    existing program. Worms almost always cause harm to the network, if only by

    consuming bandwidth, whereas viruses almost always corrupt or modify files on atargeted computer.

    A Nuke is an old denial-of-service attack against computer networks consisting offragmented or otherwise invalid ICMP packets sent to the target, achieved by using amodifiedping utility to repeatedly send this corrupt data, thus slowing down the affected

    computer until it comes to a complete stop.

    http://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/South_Koreahttp://en.wikipedia.org/wiki/South_Koreahttp://en.wikipedia.org/wiki/SI_prefixhttp://en.wikipedia.org/wiki/SI_prefixhttp://en.wikipedia.org/wiki/Exahttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Quintillionhttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/User_(computing)http://en.wikipedia.org/wiki/User_(computing)http://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Anti-virus_softwarehttp://en.wikipedia.org/wiki/Downloadinghttp://en.wikipedia.org/wiki/Downloadinghttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Internet_Control_Message_Protocolhttp://en.wikipedia.org/wiki/Pinghttp://en.wikipedia.org/wiki/Last_milehttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/South_Koreahttp://en.wikipedia.org/wiki/SI_prefixhttp://en.wikipedia.org/wiki/Exahttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Quintillionhttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/User_(computing)http://en.wikipedia.org/wiki/Computer_storagehttp://en.wikipedia.org/wiki/Software_bughttp://en.wikipedia.org/wiki/Data_losshttp://en.wikipedia.org/wiki/Anti-virus_softwarehttp://en.wikipedia.org/wiki/Downloadinghttp://en.wikipedia.org/wiki/Backuphttp://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Internet_Control_Message_Protocolhttp://en.wikipedia.org/wiki/Ping
  • 7/28/2019 2 Markers Misc

    3/21

    A distributed denial of service attack (DDoS) occurs when multiple compromisedsystems flood the bandwidth or resources of a targeted system, usually one or more web

    servers. These systems are compromised by attackers using a variety of methods.

    In the context ofcomputing and software, a Trojan horse, or simply trojan, is a piece of

    software which appears to perform a certain action, but in fact, performs another.Contrary to popular belief, this action, usually encoded in a hidden payload, may or may

    not be acutely malicious, but Trojan horses are notorious today for their use in the

    installation ofbackdoor programs. Simply put, a Trojan horse is not a computer virus.Unlike suchbadware, it does not propagate by self-replication but relies heavily on the

    exploitation of an end-user (see Social engineering). It is instead a categorical attribute

    which can encompass many different forms of codes. Therefore, a computer worm or

    virus may be a Trojan horse.

    Malware is software designed to infiltrate or damage a computer system without theowner's informed consent. Another term that has been recently coined for malware is

    badware.A vector incomputing, specifically when talking about malicious code such as viruses orworms, is the methodthat this code uses to propagate itself or infect the computer.

    Some common vectors:

    buffer overflows this is how the Blaster worm was able to propagate

    HTML email with JavaScript or other scripting enhancements

    networking protocol flaws

    The Extensible Markup Language (XML) is a general-purpose markup language.[1]

    It isclassified as an extensible language because it allows its users to define their own tags. Its

    primary purpose is to facilitate the sharing of structured data across different information

    systems, particularly via the Internet.[2] It is used both to encode documents and serializedata. In the latter context, it is comparable with other text-based serialization languages

    such as JSON and YAML

    A maser is a device that produces coherentelectromagnetic waves through amplificationdue to stimulated emission. Historically the term came from the acronym "MicrowaveAmplification by Stimulated Emission ofRadiation"

    SECAM, also written SCAM (Squentiel couleur mmoire, French for "SequentialColor with Memory"), is an analog color television system first used in France. A teamled byHenri de France working at Compagnie Franaise de Tlvision (later bought byThomson) invented SECAM. It is, historically, the first European color television

    standard.

    http://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Backdoor_(computing)http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Badwarehttp://en.wikipedia.org/wiki/Self-replicationhttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Informed_consenthttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Virushttp://en.wikipedia.org/wiki/Worm_(computing)http://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Blaster_wormhttp://en.wikipedia.org/wiki/JavaScripthttp://en.wikipedia.org/wiki/Markup_languagehttp://en.wikipedia.org/wiki/XML#_note-0%23_note-0http://en.wikipedia.org/wiki/XML#_note-0%23_note-0http://en.wikipedia.org/wiki/Extensible_languagehttp://en.wikipedia.org/wiki/Tagshttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/XML#_note-XmlOriginsGoals%23_note-XmlOriginsGoalshttp://en.wikipedia.org/wiki/Serializationhttp://en.wikipedia.org/wiki/JSONhttp://en.wikipedia.org/wiki/YAMLhttp://en.wikipedia.org/wiki/Coherence_(physics)http://en.wikipedia.org/wiki/Electromagnetic_waveshttp://en.wikipedia.org/wiki/Stimulated_emissionhttp://en.wikipedia.org/wiki/Analog_televisionhttp://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Henri_de_Francehttp://en.wikipedia.org/wiki/Henri_de_Francehttp://en.wikipedia.org/wiki/Thomson_SAhttp://en.wikipedia.org/wiki/Europehttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Backdoor_(computing)http://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Badwarehttp://en.wikipedia.org/wiki/Self-replicationhttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Informed_consenthttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Virushttp://en.wikipedia.org/wiki/Worm_(computing)http://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Blaster_wormhttp://en.wikipedia.org/wiki/JavaScripthttp://en.wikipedia.org/wiki/Markup_languagehttp://en.wikipedia.org/wiki/XML#_note-0%23_note-0http://en.wikipedia.org/wiki/Extensible_languagehttp://en.wikipedia.org/wiki/Tagshttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/XML#_note-XmlOriginsGoals%23_note-XmlOriginsGoalshttp://en.wikipedia.org/wiki/Serializationhttp://en.wikipedia.org/wiki/JSONhttp://en.wikipedia.org/wiki/YAMLhttp://en.wikipedia.org/wiki/Coherence_(physics)http://en.wikipedia.org/wiki/Electromagnetic_waveshttp://en.wikipedia.org/wiki/Stimulated_emissionhttp://en.wikipedia.org/wiki/Analog_televisionhttp://en.wikipedia.org/wiki/Francehttp://en.wikipedia.org/wiki/Henri_de_Francehttp://en.wikipedia.org/wiki/Thomson_SAhttp://en.wikipedia.org/wiki/Europe
  • 7/28/2019 2 Markers Misc

    4/21

    Operation TIPS, where the last part is an anagram for the Terrorism Information andPrevention System, was designed by President George W. Bush to have United States

    citizens report suspicious activity.

    It came under intense scrutiny in July of2002 when the Washington Postalleged in an

    editorial that the program was vaguely defined.

    A Bulletin board system, orBBS, is a computer system running software that allowsusers to dial into the system over a phone line (or Telnet) and, using a terminal program,perform functions such as downloading software and data, uploading data, reading news,

    and exchanging messages with otherusers.

    The AVATARprotocol (Advanced Video Attribute Terminal Assembler and Recreator)is a system of escape sequences (An escape sequence is a series of characters used totrigger some sort of command state in computers and their attached peripherals.)

    occasionally used on Bulletin Board Systems (BBSes). It has largely the same

    functionality as the more popular ANSI escape codes, but has the advantage that theescape sequences are much shorter. AVATAR can thus render colored text and artwork

    much faster over slow connections.

    e-Government (from electronic government, also known as e-gov, digitalgovernment, online government or in a certain context transformational government)refers to governments use of information technology to exchange information and

    services with citizens, businesses, and other arms of government. e-Government may beapplied by the legislature, judiciary, or administration, in order to improve internal

    efficiency, the delivery of public services, or processes of democratic governance. The

    primary delivery models are Government-to-Citizen orGovernment-to-Customer(G2C),

    Government-to-Business (G2B) and Government-to-Government(G2G) & Government-to-Employees (G2E). The most important anticipated benefits of e-government include

    improved efficiency, convenience, and better accessibility of public services.

    While e-government is often thought of as "online government" or "Internet-basedgovernment," many non-Internet "electronic government" technologies can be used in

    this context. Some non-internet forms include telephone, fax, PDA, SMS text messaging,

    MMS, wireless networks and services, Bluetooth, CCTV, tracking systems, RFID,biometric identification, road traffic management and regulatory enforcement, identity

    cards, smart cards and otherNFC applications; polling station technology (where non-

    online e-voting is being considered), TV and radio-based delivery of government

    services, email, online community facilities, newsgroups and electronic mailing lists,online chat, and instant messaging technologies. There are also some technology-specific

    sub-categories of e-government, such as m-government (mobile government), u-

    government (ubiquitous government), and g-government (GIS/GPS applications for e-government).

    http://en.wikipedia.org/wiki/President_of_the_United_States_of_Americahttp://en.wikipedia.org/wiki/George_W._Bushhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/2002http://en.wikipedia.org/wiki/Washington_Posthttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/Terminal_programhttp://en.wikipedia.org/wiki/User_(computing)http://en.wikipedia.org/wiki/Escape_sequencehttp://en.wikipedia.org/wiki/Escape_sequencehttp://en.wikipedia.org/wiki/Character_(computing)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Bulletin_Board_Systemhttp://en.wikipedia.org/wiki/Bulletin_Board_Systemhttp://en.wikipedia.org/wiki/ANSI_escape_codehttp://en.wikipedia.org/wiki/ASCII_arthttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Legislaturehttp://en.wikipedia.org/wiki/Judiciaryhttp://en.wikipedia.org/wiki/Public_administrationhttp://en.wikipedia.org/wiki/Public_administrationhttp://en.wikipedia.org/wiki/Governancehttp://en.wikipedia.org/wiki/G2Chttp://en.wikipedia.org/wiki/Government-to-businesshttp://en.wikipedia.org/wiki/Government-to-Governmenthttp://en.wikipedia.org/wiki/Government-to-Governmenthttp://en.wikipedia.org/w/index.php?title=Government-to-Employees&action=edithttp://en.wikipedia.org/w/index.php?title=Government-to-Employees&action=edithttp://en.wikipedia.org/wiki/Personal_Digital_Assistanthttp://en.wikipedia.org/wiki/Short_message_servicehttp://en.wikipedia.org/wiki/Multimedia_Messaging_Systemhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Closed-circuit_televisionhttp://en.wikipedia.org/wiki/Closed-circuit_televisionhttp://en.wikipedia.org/wiki/RFIDhttp://en.wikipedia.org/wiki/Biometrichttp://en.wikipedia.org/wiki/Smart_cardshttp://en.wikipedia.org/wiki/NFChttp://en.wikipedia.org/wiki/E-votinghttp://en.wikipedia.org/wiki/E-votinghttp://en.wikipedia.org/wiki/Online_communityhttp://en.wikipedia.org/wiki/Online_communityhttp://en.wikipedia.org/wiki/Newsgrouphttp://en.wikipedia.org/wiki/Electronic_mailing_listhttp://en.wikipedia.org/wiki/Online_chathttp://en.wikipedia.org/wiki/Instant_messengerhttp://en.wikipedia.org/wiki/GIShttp://en.wikipedia.org/wiki/GPShttp://en.wikipedia.org/wiki/GPShttp://en.wikipedia.org/wiki/President_of_the_United_States_of_Americahttp://en.wikipedia.org/wiki/George_W._Bushhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/2002http://en.wikipedia.org/wiki/Washington_Posthttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/Terminal_programhttp://en.wikipedia.org/wiki/User_(computing)http://en.wikipedia.org/wiki/Escape_sequencehttp://en.wikipedia.org/wiki/Character_(computing)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Bulletin_Board_Systemhttp://en.wikipedia.org/wiki/ANSI_escape_codehttp://en.wikipedia.org/wiki/ASCII_arthttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Governmenthttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Legislaturehttp://en.wikipedia.org/wiki/Judiciaryhttp://en.wikipedia.org/wiki/Public_administrationhttp://en.wikipedia.org/wiki/Governancehttp://en.wikipedia.org/wiki/G2Chttp://en.wikipedia.org/wiki/Government-to-businesshttp://en.wikipedia.org/wiki/Government-to-Governmenthttp://en.wikipedia.org/w/index.php?title=Government-to-Employees&action=edithttp://en.wikipedia.org/w/index.php?title=Government-to-Employees&action=edithttp://en.wikipedia.org/wiki/Personal_Digital_Assistanthttp://en.wikipedia.org/wiki/Short_message_servicehttp://en.wikipedia.org/wiki/Multimedia_Messaging_Systemhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Closed-circuit_televisionhttp://en.wikipedia.org/wiki/RFIDhttp://en.wikipedia.org/wiki/Biometrichttp://en.wikipedia.org/wiki/Smart_cardshttp://en.wikipedia.org/wiki/NFChttp://en.wikipedia.org/wiki/E-votinghttp://en.wikipedia.org/wiki/Online_communityhttp://en.wikipedia.org/wiki/Newsgrouphttp://en.wikipedia.org/wiki/Electronic_mailing_listhttp://en.wikipedia.org/wiki/Online_chathttp://en.wikipedia.org/wiki/Instant_messengerhttp://en.wikipedia.org/wiki/GIShttp://en.wikipedia.org/wiki/GPS
  • 7/28/2019 2 Markers Misc

    5/21

    There are many considerations and potential implications of implementing and designing

    e-government, including disintermediation of the government and its citizens, impacts on

    economic, social, and political factors, and disturbances to thestatus quo in these areas.

    Uniform Resource Locator (URL) formerly known as Universal Resource Locator, is a

    technical, Web-related term used in two distinct meanings:

    In popular usage and many technical documents, it is a synonym for Uniform

    Resource Identifier(URI);

    Strictly, the idea of a uniform syntax for global identifiers of network-retrievable

    documents was the core idea of the World Wide Web

    URLs as locators

    In its current strict technical meaning, a URL is a URI that, in addition to identifying a

    resource, [provides] a means of locating the resource by describing its primary access

    mechanism (e.g., its network location).[

    URLs are typically entered into the address orlocation barof a web browser. To the right

    is a standard Mozilla Firefox address bar. Address bars may of course vary in appearance

    depending on which web browser it is displayed in, and whichskin is in use.

    Universal Serial Bus (USB) is a serialbus standard to interface devices. A majorcomponent in thelegacy-free PC, USB was designed to allow peripherals to be connected

    using a single standardized interface socket and to improveplug-and-play capabilities by

    allowing devices to be connected and disconnected without rebooting the computer (hotswapping). Other convenient features include providing power to low-consumption

    devices without the need for an external power supply and allowing many devices to beused without requiring manufacturer specific, individualdevice driversto be installed.

    Hot swapping or hot plugging is the ability to remove and replace components of amachine, usually a computer, while it is operating. Once the appropriate software is

    installed on the computer, a user can plug and unplug the component without rebooting.

    A well-known example of this functionality is the Universal Serial Bus (USB) that allowsusers to add or remove peripheral components such as a mouse, keyboard, or printer. It

    usually requires more sophisticated software and hardware than doesplug-and-play.

    MPEG-1 Audio Layer 3, more commonly referred to as MP3, is an audio encoding

    format. MP3 is an audio-specific format. The compression removes certain parts of soundthat are outside the hearing range of most people. It provides a representation ofpulse-

    code modulation encoding audio in much less space than straightforward methods, by

    usingpsychoacousticmodels to discard components less audible to human hearing, andrecording the remaining information in an efficient manner. This is quite different from

    the principles used by, say, JPEG, an image compression format, which are purely

    Frequency Domain based.

    http://en.wikipedia.org/wiki/Disintermediationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Synonymhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Resource_(Web)http://en.wikipedia.org/wiki/Uniform_Resource_Locator#_note-RFC_3986%23_note-RFC_3986http://en.wikipedia.org/wiki/Location_barhttp://en.wikipedia.org/wiki/Location_barhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Mozilla_Firefoxhttp://en.wikipedia.org/wiki/Skin_(computing)http://en.wikipedia.org/wiki/Skin_(computing)http://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Computer_bushttp://en.wikipedia.org/wiki/Electrical_connectorhttp://en.wikipedia.org/wiki/Electrical_connectorhttp://en.wikipedia.org/wiki/Legacy_systemhttp://en.wikipedia.org/wiki/Legacy_systemhttp://en.wikipedia.org/wiki/Plug-and-playhttp://en.wikipedia.org/wiki/Rebootinghttp://en.wikipedia.org/wiki/Hot_swappinghttp://en.wikipedia.org/wiki/Hot_swappinghttp://en.wikipedia.org/wiki/Device_driverhttp://en.wikipedia.org/wiki/Device_driverhttp://en.wikipedia.org/wiki/Device_driverhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Bootinghttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Plug-and-playhttp://en.wikipedia.org/wiki/Plug-and-playhttp://en.wikipedia.org/wiki/MPEG-1http://en.wikipedia.org/wiki/Audiohttp://en.wikipedia.org/wiki/Pulse-code_modulationhttp://en.wikipedia.org/wiki/Pulse-code_modulationhttp://en.wikipedia.org/wiki/Psychoacoustichttp://en.wikipedia.org/wiki/Psychoacoustichttp://en.wikipedia.org/wiki/JPEGhttp://en.wikipedia.org/wiki/Disintermediationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Synonymhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Resource_(Web)http://en.wikipedia.org/wiki/Uniform_Resource_Locator#_note-RFC_3986%23_note-RFC_3986http://en.wikipedia.org/wiki/Location_barhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Mozilla_Firefoxhttp://en.wikipedia.org/wiki/Skin_(computing)http://en.wikipedia.org/wiki/Serial_communicationshttp://en.wikipedia.org/wiki/Computer_bushttp://en.wikipedia.org/wiki/Electrical_connectorhttp://en.wikipedia.org/wiki/Legacy_systemhttp://en.wikipedia.org/wiki/Plug-and-playhttp://en.wikipedia.org/wiki/Rebootinghttp://en.wikipedia.org/wiki/Hot_swappinghttp://en.wikipedia.org/wiki/Hot_swappinghttp://en.wikipedia.org/wiki/Device_driverhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Bootinghttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Plug-and-playhttp://en.wikipedia.org/wiki/MPEG-1http://en.wikipedia.org/wiki/Audiohttp://en.wikipedia.org/wiki/Pulse-code_modulationhttp://en.wikipedia.org/wiki/Pulse-code_modulationhttp://en.wikipedia.org/wiki/Psychoacoustichttp://en.wikipedia.org/wiki/JPEG
  • 7/28/2019 2 Markers Misc

    6/21

    In computing, JPEG (pronounced JAY-peg; IPA: / d epg/) is a commonly usedmethod of compression for photographic images. The name JPEG stands for Joint

    Photographic Experts Group, the name of the committee that created the standard. TheJPEG standard specifies both the codec, which defines how an image is compressed into

    a stream ofbytes and decompressed back into an image, and the file format used to

    contain that stream. The compression method is usually lossy compression, meaning thatsome visual quality is lost in the process, although there are variations on the standardbaseline JPEG that are lossless.

    Another way to define cybercrime is simply as criminal activity involving theinformation technology infrastructure, including illegal access (unauthorized access),illegal interception (by technical means of non-public transmissions of computer data to,from or within a computer system), data interference (unauthorized damaging, deletion,deterioration, alteration or suppression of computer data), systems interference(interfering with the functioning of a computer system by inputting, transmitting,damaging, deleting, deteriorating, altering or suppressing computer data), misuse of

    devices, forgery (ID theft), and electronic fraud.Interactive television describes a number of techniques which allow viewers to interactwithtelevision content as they view it. It is sometime called interactive TV, iTV, idTV orITV.

    Definitions of Interactive Television

    Interactive television represents a continuum from low interactivity(TV on/off, volume,

    changing channels) to moderate interactivity (simple movies on demand without playercontrols) and high interactivity in which, for example, an audience member affects the

    program being watched. The most obvious example of this would be any kind of real-time voting on the screen, in which audience votes create decisions that are reflected inhow the show continues. A return path to the program provider is not necessary to have

    an interactive program experience. Once a movie is downloaded for example, controls

    may all be local. The link was needed to download the program, but texts and software

    which can be executed locally at the set-top boxorIRD (intra-room decoder) may occurautomatically, once the viewer enters the channel.

    Return path

    To be truly interactive, the viewer must be able to alter the viewing experience (eg

    choose which angle to watch a footballmatch), or return information to thebroadcaster.

    This "return path" or "back channel" can be by telephone, mobile SMS (text messages),radio, digital subscriber lines(ADSL) orcable.

    Cable TV viewers receive their programs via a cable, and in the integrated cable return

    path enabled platforms, they use the same cable as a return path.

    http://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Image_compressionhttp://en.wikipedia.org/wiki/Joint_Photographic_Experts_Grouphttp://en.wikipedia.org/wiki/Joint_Photographic_Experts_Grouphttp://en.wikipedia.org/wiki/Codechttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Lossy_compressionhttp://en.wikipedia.org/wiki/JPEG-LShttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/Interactivityhttp://en.wikipedia.org/wiki/Interactivityhttp://en.wikipedia.org/wiki/Video_on_demandhttp://en.wikipedia.org/wiki/Votinghttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/IRDhttp://en.wikipedia.org/wiki/Decoderhttp://en.wikipedia.org/wiki/Footballhttp://en.wikipedia.org/wiki/Footballhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Broadcastinghttp://en.wikipedia.org/wiki/Broadcastinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Digital_subscriber_linehttp://en.wikipedia.org/wiki/Digital_subscriber_linehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cable_TVhttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Image_compressionhttp://en.wikipedia.org/wiki/Joint_Photographic_Experts_Grouphttp://en.wikipedia.org/wiki/Joint_Photographic_Experts_Grouphttp://en.wikipedia.org/wiki/Codechttp://en.wikipedia.org/wiki/Bytehttp://en.wikipedia.org/wiki/Lossy_compressionhttp://en.wikipedia.org/wiki/JPEG-LShttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/Interactivityhttp://en.wikipedia.org/wiki/Video_on_demandhttp://en.wikipedia.org/wiki/Votinghttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/IRDhttp://en.wikipedia.org/wiki/Decoderhttp://en.wikipedia.org/wiki/Footballhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Broadcastinghttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Digital_subscriber_linehttp://en.wikipedia.org/wiki/Cablehttp://en.wikipedia.org/wiki/Cable_TV
  • 7/28/2019 2 Markers Misc

    7/21

    Satellite viewers (mostly) return information to the broadcaster via their regular

    telephone lines. They are charged for this service on their regular telephone bill. An

    Internetconnection via ADSL, or other, data communications technology, is also beingincreasingly used.

    Interactive TV can also be delivered via a terrestrial aerial (digital terrestrial TV such as'Freeview' in the UK). In this case, there is often no 'return path' as such - so data cannot

    be sent back to the broadcaster (so you could not, for instance, vote on a TV show, ororder a product sample) . However, interactivity is still possible as there is still the

    opportunity to interact with an application which is broadcast and downloaded to the set-

    top box (so you could still choose camera angles, play games etc).

    Increasingly the return path is becoming a broadband IP connection, and some hybrid

    receivers are now capable of displaying video from either the IP connection or from

    traditional tuners. Some devices are now dedicated to displaying video only from the IP

    channel, which has given rise to IPTV - Internet Protocol Television. The rise of the

    "broadband return path" has given new relevance to Interactive TV, as it opens up theneed to interact with Video on Demand servers, advertisers, and web site operators.

    Video on demand (VOD) systems allow users to select and watch video andclip contentover a network as part of an interactive television system. VOD systems either "stream"content, allowing viewing in real time, or "download" it in which the program is brought

    in its entirety to a set-top box before viewing starts. The latter is more appropriately

    termed "store and forward". The majority ofcable and telcobased VOD systems use thestreaming approach, whereby a user buys or selects a movie ortelevision program and it

    begins to play on the television set almost instantaneously.

    Often, nowadays, the term encompasses a broader spectrum of delivery devices, referringnot only to set-top-boxes but also computers, mobile phones and indeed any system thatcan receive on-demand audio-visual content over a network.

    A set-top box (STB) orset-top unit (STU) is a device that connects to a television andan external source ofsignal, turning the signal into content which is then displayed on thetelevision screen. In IPTV networks, the set-top box is a small computer providing two-

    way communications on an IPnetwork, and decoding the video streaming media, using a

    new technology called Power over Ethernet (POE), which eliminates the need for any

    coaxial cabling. Using the new POE technology allows for instant updates to boxes,making for a more manageable and reliable system.

    IPTV (Internet Protocol Television) is a system where a digital television service isdelivered by using Internet Protocol over a network infrastructure, which may includedelivery by a broadbandconnection. A general definition of IPTV is television content

    that, instead of being delivered through traditional broadcast and cable formats, is

    received by the viewer through the technologies used for computer networks.

    http://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/ADSLhttp://en.wikipedia.org/wiki/Data_communicationshttp://en.wikipedia.org/wiki/Data_communicationshttp://en.wikipedia.org/wiki/Aerialhttp://en.wikipedia.org/wiki/Freeviewhttp://en.wikipedia.org/wiki/Freeviewhttp://en.wikipedia.org/wiki/Freeviewhttp://en.wikipedia.org/wiki/UKhttp://en.wikipedia.org/wiki/E-commercehttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Video_cliphttp://en.wikipedia.org/wiki/Video_cliphttp://en.wikipedia.org/wiki/Interactive_televisionhttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Downloadhttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/Store_and_forwardhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Telephone_companyhttp://en.wikipedia.org/wiki/Telephone_companyhttp://en.wikipedia.org/wiki/Moviehttp://en.wikipedia.org/wiki/Television_programhttp://en.wikipedia.org/wiki/Information_appliancehttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/Signal_(information_theory)http://en.wikipedia.org/wiki/Contenthttp://en.wikipedia.org/wiki/Television_screenhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Power_over_Ethernethttp://en.wikipedia.org/wiki/Digital_televisionhttp://en.wikipedia.org/wiki/Digital_televisionhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Satellitehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/ADSLhttp://en.wikipedia.org/wiki/Data_communicationshttp://en.wikipedia.org/wiki/Aerialhttp://en.wikipedia.org/wiki/Freeviewhttp://en.wikipedia.org/wiki/UKhttp://en.wikipedia.org/wiki/E-commercehttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Video_cliphttp://en.wikipedia.org/wiki/Interactive_televisionhttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Downloadhttp://en.wikipedia.org/wiki/Set-top_boxhttp://en.wikipedia.org/wiki/Store_and_forwardhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Telephone_companyhttp://en.wikipedia.org/wiki/Moviehttp://en.wikipedia.org/wiki/Television_programhttp://en.wikipedia.org/wiki/Information_appliancehttp://en.wikipedia.org/wiki/Televisionhttp://en.wikipedia.org/wiki/Signal_(information_theory)http://en.wikipedia.org/wiki/Contenthttp://en.wikipedia.org/wiki/Television_screenhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Power_over_Ethernethttp://en.wikipedia.org/wiki/Digital_televisionhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Broadband
  • 7/28/2019 2 Markers Misc

    8/21

    For residential users, IPTV is often provided in conjunction with Video on Demand and

    may be bundled with Internet services such as Web access and VoIP. The commercial

    bundling of IPTV, VoIP and Internet access is referred to as "Triple Play" service (addingmobility is called "Quadruple Play"). IPTV is typically supplied by a service provider

    using a closed network infrastructure. This closed network approach is in competition

    with the delivery of TV content over the public Internet, called Internet Television. Inbusinesses, IPTV may be used to deliver television content over corporate LANs.

    Advantages

    The IP-based platform offers significant advantages, including the ability to integrate

    television with other IP-based services like high speed Internet access and VoIP.

    A switched IP network also allows for the delivery of significantly more content and

    functionality. In a typical TV or satellite network, using broadcast video technology, all

    the content constantly flows downstream to each customer, and the customer switches the

    content at the set-top box. The customer can select from as many choices as thetelecomms, cable or satellite company can stuff into the pipe flowing into the home. A

    switched IP network works differently. Content remains in the network, and only the

    content the customer selects is sent into the customers home. That frees up bandwidth,and the customers choice is less restricted by the size of the pipe into the home. This

    also implies that the customer's privacy could be compromised to a greater extent than is

    possible with traditional TV or satellite networks. It may also provide a means to hackinto, or at least disrupt (see Denial of Service) the private network.

    [edit] Interactivity

    An IP-based platform also allows significant opportunities to make the TV viewingexperience more interactive and personalized. The supplier may, for example, include aninteractive program guide that allows viewers to search for content by title or actors

    name, or a picture-in-picture functionality that allows them to channel surf without

    leaving the program theyre watching. Viewers may be able to look up a players stats

    while watching a sports game, or control the camera angle. They also may be able toaccess photos or music from their PC on their television, use a wireless phone to schedule

    a recording of their favorite show, or even adjust parental controls so their child can

    watch a documentary for a school report, while theyre away from home.

    Note that this is all possible, to some degree, with existing digital terrestrial, satellite and

    cable networks in tandem with modern set top boxes.

    [edit] VoD

    VoD stands for Video on Demand. VoD permits a customer to browse an onlineprogramme or film catalogue, to watch trailers and to then select a selected recording for

    playback. The playout of the selected movie starts nearly instantaneously on the

    customer's TV or PC.

    http://en.wikipedia.org/wiki/Video_on_Demandhttp://en.wikipedia.org/wiki/Internet_servicehttp://en.wikipedia.org/wiki/Internet_servicehttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Triple_play_(telecommunications)http://en.wikipedia.org/wiki/Internet_televisionhttp://en.wikipedia.org/wiki/Denial_of_Servicehttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=5http://en.wikipedia.org/wiki/Picture-in-picturehttp://en.wikipedia.org/wiki/Set_top_boxhttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=6http://en.wikipedia.org/wiki/Playouthttp://en.wikipedia.org/wiki/Video_on_Demandhttp://en.wikipedia.org/wiki/Internet_servicehttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Triple_play_(telecommunications)http://en.wikipedia.org/wiki/Internet_televisionhttp://en.wikipedia.org/wiki/Denial_of_Servicehttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=5http://en.wikipedia.org/wiki/Picture-in-picturehttp://en.wikipedia.org/wiki/Set_top_boxhttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=6http://en.wikipedia.org/wiki/Playout
  • 7/28/2019 2 Markers Misc

    9/21

    Technically, when the customer selects the movie, a point-to-point unicast connection is

    set up between the customer's decoder (SetTopBox or PC) and the delivering streaming

    server. The signalling for the trick play functionality (pause, slow-motion, wind/rewindetc.) is assured by RTSP (Real Time Streaming Protocol).

    The most common codecs used for VoD are MPEG-2, MPEG-4 andVC-1.

    In an attempt to avoid content piracy, the VoD content is usually encrypted. Whilst

    encryption of satellite and cable TV broadcasts is an old practice, with IPTV technologyit can effectively be thought of as a form ofDigital Rights Management. A film that is

    chosen, for example, may be playable for 24 hours following payment, after which time it

    becomes unavailable.

    [edit] IPTV based Converged Services

    Another advantage of an IP-based network is the opportunity for integration and

    convergence. Converged services implies interaction of existing services in a seamlessmanner to create new value added services. One good example is On-Screen Caller ID,getting Caller ID on your TV and the ability to handle it (send it to voice mail, etc). IP-

    based services will help to enable efforts to provide consumers anytime-anywhere access

    to content over their televisions, PCs and cell phones, and to integrate services and

    content to tie them together. Within businesses and institutions, IPTV eliminates the needto run a parallel infrastructure to deliver live and stored video services.

    The Moving Picture Experts Group, commonly referred to as simply MPEG, is aworking groupof ISO/IEC charged with the development of video and audio encodingstandards. MPEG-1: Initial video and audio compression standard. Later used as the

    standard for Video CD, and includes the popular Layer 3 (MP3) audio compressionformat.

    An operating system (OS) is the software that manages the sharing of the resources of acomputerand providesprogrammers with an interface used to access those resources. An

    operating system processes system data and user input, and responds by allocating and

    managing tasks and internal system resources as a service to users and programs of the

    system. At the foundation of all system software, an operating system performs basictasks such as controlling and allocating memory, prioritizing system requests, controlling

    input and output devices, facilitating networking and managing file systems. Most

    operating systems come with an application that provides a user interface for managing

    the operating system, such as a command line interpreterorgraphical user interface. Theoperating system forms aplatformfor othersystem software and forapplication software.

    The most commonly-used contemporary desktop OS is Microsoft Windows, with Mac

    OS X also being well-known. Linux and the BSDare popularUnix-like systems.

    Linux (pronunciation: IPA: / l nks/, lin-uks) is a Unix-like computeroperating system.Linux is one of the most prominent examples of free software and open source

    http://en.wikipedia.org/wiki/Point-to-pointhttp://en.wikipedia.org/wiki/VC-1http://en.wikipedia.org/wiki/VC-1http://en.wikipedia.org/wiki/VC-1http://en.wikipedia.org/w/index.php?title=Content_piracy&action=edithttp://en.wikipedia.org/wiki/Digital_Rights_Managementhttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=7http://en.wikipedia.org/wiki/Working_grouphttp://en.wikipedia.org/wiki/Working_grouphttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/International_Electrotechnical_Commissionhttp://en.wikipedia.org/wiki/MPEG-1http://en.wikipedia.org/wiki/MPEG-1http://en.wikipedia.org/wiki/Video_compressionhttp://en.wikipedia.org/wiki/Audio_compression_(data)http://en.wikipedia.org/wiki/Audio_compression_(data)http://en.wikipedia.org/wiki/Video_CDhttp://en.wikipedia.org/wiki/MP3http://en.wikipedia.org/wiki/Resource_(computer_science)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Programmershttp://en.wikipedia.org/wiki/Memory_(computers)http://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/wiki/Command_line_interpreterhttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/System_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/BSDhttp://en.wikipedia.org/wiki/BSDhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Free_softwarehttp://en.wikipedia.org/wiki/Open_sourcehttp://en.wikipedia.org/wiki/Point-to-pointhttp://en.wikipedia.org/wiki/VC-1http://en.wikipedia.org/w/index.php?title=Content_piracy&action=edithttp://en.wikipedia.org/wiki/Digital_Rights_Managementhttp://en.wikipedia.org/w/index.php?title=IPTV&action=edit&section=7http://en.wikipedia.org/wiki/Working_grouphttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/International_Electrotechnical_Commissionhttp://en.wikipedia.org/wiki/MPEG-1http://en.wikipedia.org/wiki/Video_compressionhttp://en.wikipedia.org/wiki/Audio_compression_(data)http://en.wikipedia.org/wiki/Video_CDhttp://en.wikipedia.org/wiki/MP3http://en.wikipedia.org/wiki/Resource_(computer_science)http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Programmershttp://en.wikipedia.org/wiki/Memory_(computers)http://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/wiki/Command_line_interpreterhttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Platform_(computing)http://en.wikipedia.org/wiki/System_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/BSDhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Free_softwarehttp://en.wikipedia.org/wiki/Open_source
  • 7/28/2019 2 Markers Misc

    10/21

    development; its underlying source code can be freely modified, used, and redistributed

    by anyone.

    Incomputer networking, the term IP (Internet Protocol) address spoofing refers to thecreation of IPpackets with a forged (spoofed) source IP address with the purpose of

    concealing the identity of the sender or impersonating another computing system.

    HTTP cookies, sometimes known as web cookies or just cookies, are parcels of text sentby a serverto a webbrowserand then sent back unchanged by the browser each time itaccesses that server. HTTP cookies are used forauthenticating, tracking, and maintaining

    specific information about users, such as site preferences or the contents of their

    electronic shopping carts. The term "cookie" is derived from "magic cookie," a well-known concept in UNIX computing which inspired both the idea and the name of HTTP

    cookies.

    Cookies have been of concern for Internet privacy, since they can be used for tracking

    browsing behavior. As a result, they have been subject to legislation in various countriessuch as the United States and in the European Union. Cookies have also been criticized

    because the identification of users they provide is not always accurate and because they

    could potentially be a target of network attackers. Some alternatives to cookies exist, but

    each has its own uses, advantages and drawbacks.

    Cookies are also subject to a number of misconceptions, mostly based on the erroneous

    notion that they are computer programs. In fact, cookies are simple pieces of data unable

    to perform any operation by themselves. In particular, they are neither spyware norviruses, despite the detection of cookies from certain sites by many anti-spyware

    products.

    Most modern browsers allow users to decide whether to accept cookies, but rejection

    makes some websites unusable. For example, shopping baskets implemented usingcookies do not work if cookies are rejected

    Spyware is computer softwarethat is installed surreptitiously on apersonal computertointercept or take partial control over the user's interaction with the computer, without the

    user's informed consent.

    While the termspyware suggests software that secretly monitors the user's behavior, thefunctions of spyware extend well beyond simple monitoring. Spyware programs can

    collect various types ofpersonal information, but can also interfere with user control ofthe computer in other ways, such as installing additional software, redirectingWebbrowseractivity, accessing websites blindly that will cause more harmful viruses, or

    diverting advertising revenue to a third party. Spyware can even change computer

    settings, resulting in slow connection speeds, different home pages, and loss ofInternet orother programs. In an attempt to increase the understanding of spyware, a more formal

    classification of its included software types is captured under the termprivacy-invasive

    software.

    http://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Packethttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_shopping_carthttp://en.wikipedia.org/wiki/Magic_cookiehttp://en.wikipedia.org/wiki/UNIXhttp://en.wikipedia.org/wiki/Internet_privacyhttp://en.wikipedia.org/wiki/Internet_privacyhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/European_Unionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Informed_consenthttp://en.wikipedia.org/wiki/Personally_identifiable_informationhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Privacy-invasive_softwarehttp://en.wikipedia.org/wiki/Privacy-invasive_softwarehttp://en.wikipedia.org/wiki/Privacy-invasive_softwarehttp://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Packethttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_shopping_carthttp://en.wikipedia.org/wiki/Magic_cookiehttp://en.wikipedia.org/wiki/UNIXhttp://en.wikipedia.org/wiki/Internet_privacyhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/European_Unionhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Informed_consenthttp://en.wikipedia.org/wiki/Personally_identifiable_informationhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Privacy-invasive_softwarehttp://en.wikipedia.org/wiki/Privacy-invasive_software
  • 7/28/2019 2 Markers Misc

    11/21

    A Web bug is an object that is embedded in aweb pageore-mail and is usually invisibleto the user but allows checking that a user has viewed the page or e-mail. One common

    use is in e-mail tracking. Alternative names are Web beacon, tracking bug, pixel tag,11 gif, and clear gif.

    In computing, phishing is an attempt to criminally and fraudulently acquire sensitiveinformation, such as usernames, passwords and credit carddetails, by masquerading as atrustworthy entity in an electronic communication. eBay, PayPal and online banks arecommon targets. Phishing is typically carried out by email or instant messaging,[1] and

    often directs users to enter details at a website, although phone contact has also been

    used.[2] Phishing is an example of social engineering techniques used to fool users.[3]

    Attempts to deal with the growing number of reported phishing incidents include

    legislation, user training, public awareness, and technical measures

    POSIXor "Portable Operating System Interface"[1] is the collective name of a family ofrelatedstandards specified by the IEEE to define theapplication programming interface

    (API) for software compatible with variants of the Unixoperating system.

    Unix (officially trademarked as UNIX, sometimes also written as UNIX or UNIX withsmall caps) is a computeroperating system originally developed in 1969 by a group of

    AT&T employees atBell Labs including Ken Thompson,Dennis RitchieandDouglasMcIlroy. Today's Unix systems are split into various branches, developed over time by

    AT&T as well as various commercial vendors and non-profit organizations.

    As of 2007, the owner of the trademarkUNIX is The Open Group, an industry

    standards consortium. Only systems fully compliant with and certified to theSingle

    UNIX Specificationqualify as "UNIX" (others are called "Unix system-like" or "Unix-like").

    A digital camera is an electronic device used to capture and storephotographs digitally,instead of usingphotographic filmlike conventional cameras, or recording images in ananalog format to magnetic tapelike many video cameras.

    A firewall is a hardware orsoftwaredevice which is configured to permit or denyproxydata through a computer networkwhich has different levels of trust.

    Multimedia (Lat. Multum + Medium) is media that uses multiple forms ofinformation

    contentand information processing (e.g. text, audio, graphics,animation,video,interactivity) to inform or entertain the (user) audience.Multimedia also refers to the use

    of (but not limited to) electronic media to store and experience multimedia content.

    Multimedia is similar to traditional mixed mediainfine art, but with a broader scope. Theterm "rich media" is synonymous forinteractive multimedia. Multimedia means that

    computer info can be represented through audio, graphics, image, video and animation in

    addition to traditional media(text and graphics). Hypermedia can be considered oneparticular multimedia application.

    http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/E-mail_trackinghttp://en.wikipedia.org/wiki/E-mail_trackinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Criminalhttp://en.wikipedia.org/wiki/Criminalhttp://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/PayPalhttp://en.wikipedia.org/wiki/PayPalhttp://en.wikipedia.org/wiki/Online_bankinghttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/Phishing#_note-0%23_note-0http://en.wikipedia.org/wiki/Phishing#_note-1%23_note-1http://en.wikipedia.org/wiki/Social_engineering_(computer_security)http://en.wikipedia.org/wiki/Phishing#_note-2%23_note-2http://en.wikipedia.org/wiki/Legislationhttp://en.wikipedia.org/wiki/POSIX#_note-IEEE%23_note-IEEEhttp://en.wikipedia.org/wiki/Standardizationhttp://en.wikipedia.org/wiki/Standardizationhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Application_programming_interfacehttp://en.wikipedia.org/wiki/Application_programming_interfacehttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/AT%26Thttp://en.wikipedia.org/wiki/Bell_Labshttp://en.wikipedia.org/wiki/Bell_Labshttp://en.wikipedia.org/wiki/Ken_Thompson_(computer_programmer)http://en.wikipedia.org/wiki/Dennis_Ritchiehttp://en.wikipedia.org/wiki/Dennis_Ritchiehttp://en.wikipedia.org/wiki/Dennis_Ritchiehttp://en.wikipedia.org/wiki/Douglas_McIlroyhttp://en.wikipedia.org/wiki/Douglas_McIlroyhttp://en.wikipedia.org/wiki/Douglas_McIlroyhttp://en.wikipedia.org/wiki/Trademarkhttp://en.wikipedia.org/wiki/Trademarkhttp://en.wikipedia.org/wiki/The_Open_Grouphttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Photographhttp://en.wikipedia.org/wiki/Photographhttp://en.wikipedia.org/wiki/Photographic_filmhttp://en.wikipedia.org/wiki/Photographic_filmhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Magnetic_tapehttp://en.wikipedia.org/wiki/Magnetic_tapehttp://en.wikipedia.org/wiki/Video_camerashttp://en.wikipedia.org/wiki/Hardwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Information_processinghttp://en.wikipedia.org/wiki/Typographyhttp://en.wikipedia.org/wiki/Soundhttp://en.wikipedia.org/wiki/Imagehttp://en.wikipedia.org/wiki/Imagehttp://en.wikipedia.org/wiki/Animationhttp://en.wikipedia.org/wiki/Animationhttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Interactivityhttp://en.wikipedia.org/wiki/Electronic_mediahttp://en.wikipedia.org/wiki/Mixed_mediahttp://en.wikipedia.org/wiki/Mixed_mediahttp://en.wikipedia.org/wiki/Fine_arthttp://en.wikipedia.org/wiki/Fine_arthttp://en.wikipedia.org/wiki/Interactive_mediahttp://en.wikipedia.org/wiki/Interactive_mediahttp://en.wikipedia.org/wiki/Hypermediahttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/E-mail_trackinghttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Criminalhttp://en.wikipedia.org/wiki/Fraudhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/PayPalhttp://en.wikipedia.org/wiki/Online_bankinghttp://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Instant_messaginghttp://en.wikipedia.org/wiki/Phishing#_note-0%23_note-0http://en.wikipedia.org/wiki/Phishing#_note-1%23_note-1http://en.wikipedia.org/wiki/Social_engineering_(computer_security)http://en.wikipedia.org/wiki/Phishing#_note-2%23_note-2http://en.wikipedia.org/wiki/Legislationhttp://en.wikipedia.org/wiki/POSIX#_note-IEEE%23_note-IEEEhttp://en.wikipedia.org/wiki/Standardizationhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Application_programming_interfacehttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/AT%26Thttp://en.wikipedia.org/wiki/Bell_Labshttp://en.wikipedia.org/wiki/Ken_Thompson_(computer_programmer)http://en.wikipedia.org/wiki/Dennis_Ritchiehttp://en.wikipedia.org/wiki/Douglas_McIlroyhttp://en.wikipedia.org/wiki/Douglas_McIlroyhttp://en.wikipedia.org/wiki/Trademarkhttp://en.wikipedia.org/wiki/The_Open_Grouphttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Single_UNIX_Specificationhttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Electronicshttp://en.wikipedia.org/wiki/Photographhttp://en.wikipedia.org/wiki/Photographic_filmhttp://en.wikipedia.org/wiki/Camerahttp://en.wikipedia.org/wiki/Magnetic_tapehttp://en.wikipedia.org/wiki/Video_camerashttp://en.wikipedia.org/wiki/Hardwarehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Datahttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Information_processinghttp://en.wikipedia.org/wiki/Typographyhttp://en.wikipedia.org/wiki/Soundhttp://en.wikipedia.org/wiki/Imagehttp://en.wikipedia.org/wiki/Animationhttp://en.wikipedia.org/wiki/Videohttp://en.wikipedia.org/wiki/Interactivityhttp://en.wikipedia.org/wiki/Electronic_mediahttp://en.wikipedia.org/wiki/Mixed_mediahttp://en.wikipedia.org/wiki/Fine_arthttp://en.wikipedia.org/wiki/Interactive_mediahttp://en.wikipedia.org/wiki/Hypermedia
  • 7/28/2019 2 Markers Misc

    12/21

    HTML, an initialism of Hypertext Markup Language: Standard GeneralizedMarkup Language (SGML)

    In computing, FLOPS (or flops or flop/s) is an acronym meaning FLoating point

    Operations PerSecond. The FLOPS is a measure of a computer'sperformance, especiallyin fields of scientific calculations that make heavy use of floating point calculations;similar to instructions per second.

    Instructions per second (IPS) is a measure of acomputer's processor speed. The term iscommonly used in association with a numeric value such as thousand instructions persecond (kIPS), million instructions per second (MIPS), or Million Operations perSecond (MOPS).

    Blue Gene is a computer architectureproject designed to produce several next-generation

    supercomputers, designed to reach operating speeds in the PFLOPS (petaFLOPS) range,and currently reaching sustained speeds over 360 TFLOPS (teraFLOPS). It is a

    cooperative project among IBM (particularly theThomas J. Watson Research Center),

    the Lawrence Livermore National Laboratory, the United States Department of Energy

    (which is partially funding the project), and academia. There are four Blue Gene projectsin development: BlueGene/L, BlueGene/C, BlueGene/P, and BlueGene/Q.

    Electronic commerce, commonly known as e-commerce oreCommerce, consists of thebuying and selling ofproducts or services over electronic systems such as the Internet

    and othercomputer networks. The amount of trade conducted electronically has growndramatically since the spread of the Internet. A wide variety of commerce is conducted in

    this way, spurring and drawing on innovations in electronic funds transfer,supply chainmanagement, Internet marketing, online transaction processing, electronic datainterchange (EDI), automated inventory management systems, and automated data

    collection systems. Online retailers are sometimes known as e-tailers and online retail isknown as e-tail. An inter-company, application-to-application communication of data instandard format for business transactions Electronic Data Interchange (EDI) is a set ofstandardsfor structuring information that is to be electronically exchanged between and

    within businesses, organizations, government entities and other groups.

    Ethernet is a family offrame-based computer networkingtechnologies forlocal areanetworks (LANs). The name comes from the physical concept of theether. It defines a

    number of wiring and signaling standards for thephysical layer, through means ofnetwork access at the Media Access Control (MAC)/Data Link Layer, and a common

    addressing format.

    Ethernet is standardized as IEEE 802.3. The combination of thetwisted pair versions of

    Ethernet for connecting end systems to the network, along with the fiber optic versionsfor site backbones, is the most widespread wired LAN technology. It has been in use

    http://en.wikipedia.org/wiki/Initialismhttp://en.wikipedia.org/wiki/Initialismhttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_performancehttp://en.wikipedia.org/wiki/Floating_pointhttp://en.wikipedia.org/wiki/Calculationhttp://en.wikipedia.org/wiki/Instructions_per_secondhttp://en.wikipedia.org/wiki/Instructions_per_secondhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Supercomputerhttp://en.wikipedia.org/wiki/FLOPShttp://en.wikipedia.org/wiki/FLOPShttp://en.wikipedia.org/wiki/FLOPShttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Thomas_J._Watson_Research_Centerhttp://en.wikipedia.org/wiki/Thomas_J._Watson_Research_Centerhttp://en.wikipedia.org/wiki/Lawrence_Livermore_National_Laboratoryhttp://en.wikipedia.org/wiki/Lawrence_Livermore_National_Laboratoryhttp://en.wikipedia.org/wiki/United_States_Department_of_Energyhttp://en.wikipedia.org/wiki/Academiahttp://en.wikipedia.org/wiki/Academiahttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Electronic_funds_transferhttp://en.wikipedia.org/wiki/Electronic_funds_transferhttp://en.wikipedia.org/wiki/Supply_chain_managementhttp://en.wikipedia.org/wiki/Supply_chain_managementhttp://en.wikipedia.org/wiki/Supply_chain_managementhttp://en.wikipedia.org/wiki/Internet_marketinghttp://en.wikipedia.org/wiki/Online_transaction_processinghttp://en.wikipedia.org/wiki/Electronic_data_interchangehttp://en.wikipedia.org/wiki/Electronic_data_interchangehttp://en.wikipedia.org/wiki/Inventory_managementhttp://en.wikipedia.org/wiki/Standardhttp://en.wikipedia.org/wiki/Standardhttp://en.wikipedia.org/wiki/Data_framehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Initialismhttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_performancehttp://en.wikipedia.org/wiki/Floating_pointhttp://en.wikipedia.org/wiki/Calculationhttp://en.wikipedia.org/wiki/Instructions_per_secondhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_architecturehttp://en.wikipedia.org/wiki/Supercomputerhttp://en.wikipedia.org/wiki/FLOPShttp://en.wikipedia.org/wiki/FLOPShttp://en.wikipedia.org/wiki/IBMhttp://en.wikipedia.org/wiki/Thomas_J._Watson_Research_Centerhttp://en.wikipedia.org/wiki/Lawrence_Livermore_National_Laboratoryhttp://en.wikipedia.org/wiki/United_States_Department_of_Energyhttp://en.wikipedia.org/wiki/Academiahttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Service_(economics)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Electronic_funds_transferhttp://en.wikipedia.org/wiki/Supply_chain_managementhttp://en.wikipedia.org/wiki/Supply_chain_managementhttp://en.wikipedia.org/wiki/Internet_marketinghttp://en.wikipedia.org/wiki/Online_transaction_processinghttp://en.wikipedia.org/wiki/Electronic_data_interchangehttp://en.wikipedia.org/wiki/Electronic_data_interchangehttp://en.wikipedia.org/wiki/Inventory_managementhttp://en.wikipedia.org/wiki/Standardhttp://en.wikipedia.org/wiki/Data_framehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Luminiferous_aetherhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Ethernet_over_twisted_pairhttp://en.wikipedia.org/wiki/Ethernet_over_twisted_pair
  • 7/28/2019 2 Markers Misc

    13/21

    from the 1990s to thepresent, largely replacing competing LAN standards such as token

    ring,FDDI, and ARCNET. In recent years, Wi-Fi, the wireless LAN standardized by

    IEEE 802.11, is prevalent in home and small office networks and augmenting Ethernet inlarger installations.[

    A digital signature ordigital signature scheme is a type ofasymmetric cryptographyused to simulate the security properties of a signature in digital, rather than written, form.Digital signature schemes normally give two algorithms, one for signing which involvesthe user's secret orprivate key, and one for verifying signatures which involves the user's

    public key. The output of the signature process is called the "digital signature."

    Digital signatures, like written signatures, are used to provide authenticationof theassociated input, usually called a "message." Messages may be anything, from electronic

    mail to a contract, or even a message sent in a more complicatedcryptographic protocol.

    Digital signatures are used to createpublic key infrastructure (PKI) schemes in which a

    user's public key (whether forpublic-key encryption, digital signatures, or any other

    purpose) is tied to a user by a digital identity certificateissued by acertificate authority.PKI schemes attempt to unbreakably bind user information (name, address, phone

    number, etc.) to a public key, so that public keys can be used as a form ofidentification.

    Digital signatures are often used to implement electronic signatures, a broader term thatrefers to any electronic data that carries the intent of a signature[1], but not all electronic

    signatures use digital signatures.[2][3][4][5] In some countries, including the United States,

    and in the European Union, electronic signatures have legal significance. However, lawsconcerning electronic signatures do not always make clear their applicability towards

    cryptographic digital signatures, leaving their legal importance somewhat unspecified

    The Internet Message Access Protocol (commonly known as IMAP or IMAP4, andpreviously calledInternet Mail Access Protocol,Interactive Mail Access Protocol(RFC1064), and Interim Mail Access Protocol[1]) is an application layer Internet protocol

    operating on port 143 that allows a localclientto access e-mail on a remoteserver.

    WAP(wireless application protocol) is an open international standard for applicationsthat use wireless communication. Its principal application is to enable access to the

    Internetfrom a mobile phone orPDA.

    A WAP browser provides all of the basic services of a computer based web browserbut

    simplified to operate within the restrictions of a mobile phone. The Japanese i-modesystem is another major competing wireless data protocol.

    WAP sites, are websites written in, or dynamically converted to, WML (Wireless Markup

    Language) and accessed via the WAP browser.

    http://en.wikipedia.org/wiki/As_of_2007http://en.wikipedia.org/wiki/As_of_2007http://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Fiber_distributed_data_interfacehttp://en.wikipedia.org/wiki/Fiber_distributed_data_interfacehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Asymmetric_key_algorithmhttp://en.wikipedia.org/wiki/Asymmetric_key_algorithmhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Private_keyhttp://en.wikipedia.org/wiki/Private_keyhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Contracthttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public-key_encryptionhttp://en.wikipedia.org/wiki/Digital_identity_certificatehttp://en.wikipedia.org/wiki/Digital_identity_certificatehttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Electronic_signaturehttp://en.wikipedia.org/wiki/Digital_signature#_note-0%23_note-0http://en.wikipedia.org/wiki/Digital_signature#_note-1%23_note-1http://en.wikipedia.org/wiki/Digital_signature#_note-2%23_note-2http://en.wikipedia.org/wiki/Digital_signature#_note-2%23_note-2http://en.wikipedia.org/wiki/Digital_signature#_note-3%23_note-3http://en.wikipedia.org/wiki/Digital_signature#_note-3%23_note-3http://en.wikipedia.org/wiki/Digital_signature#_note-4%23_note-4http://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/European_Unionhttp://en.wikipedia.org/wiki/European_Unionhttp://tools.ietf.org/html/rfc1064http://tools.ietf.org/html/rfc1064http://en.wikipedia.org/wiki/IMAP#_note-0%23_note-0http://en.wikipedia.org/wiki/Application_layerhttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Mail_serverhttp://en.wikipedia.org/wiki/Mail_serverhttp://en.wikipedia.org/wiki/Wireless_communicationhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/I-modehttp://en.wikipedia.org/wiki/I-modehttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Wireless_Markup_Languagehttp://en.wikipedia.org/wiki/Wireless_Markup_Languagehttp://en.wikipedia.org/wiki/As_of_2007http://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Fiber_distributed_data_interfacehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Asymmetric_key_algorithmhttp://en.wikipedia.org/wiki/Signaturehttp://en.wikipedia.org/wiki/Private_keyhttp://en.wikipedia.org/wiki/Public_keyhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Contracthttp://en.wikipedia.org/wiki/Cryptographic_protocolhttp://en.wikipedia.org/wiki/Public_key_infrastructurehttp://en.wikipedia.org/wiki/Public-key_encryptionhttp://en.wikipedia.org/wiki/Digital_identity_certificatehttp://en.wikipedia.org/wiki/Certificate_authorityhttp://en.wikipedia.org/wiki/Identificationhttp://en.wikipedia.org/wiki/Electronic_signaturehttp://en.wikipedia.org/wiki/Digital_signature#_note-0%23_note-0http://en.wikipedia.org/wiki/Digital_signature#_note-1%23_note-1http://en.wikipedia.org/wiki/Digital_signature#_note-2%23_note-2http://en.wikipedia.org/wiki/Digital_signature#_note-3%23_note-3http://en.wikipedia.org/wiki/Digital_signature#_note-4%23_note-4http://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/European_Unionhttp://tools.ietf.org/html/rfc1064http://tools.ietf.org/html/rfc1064http://en.wikipedia.org/wiki/IMAP#_note-0%23_note-0http://en.wikipedia.org/wiki/Application_layerhttp://en.wikipedia.org/wiki/E-mail_clienthttp://en.wikipedia.org/wiki/E-mailhttp://en.wikipedia.org/wiki/Mail_serverhttp://en.wikipedia.org/wiki/Wireless_communicationhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/I-modehttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Wireless_Markup_Languagehttp://en.wikipedia.org/wiki/Wireless_Markup_Language
  • 7/28/2019 2 Markers Misc

    14/21

    Before the introduction of WAP, service providers had extremely limited opportunities to

    offer interactive data services. Interactive data applications are required to support now

    commonplace activities such as:

    email by mobile phone

    tracking of stock market prices

    sports results

    news headlines

    music downloads

    The clock rate is the fundamental rate in cycles per second(measured in hertz) at whicha computerperforms its most basic operations such as adding two numbers or

    transferring a value from oneprocessor registerto another. Different chips on themotherboardmay have different clock rates. Usually when referring to a computer, the

    term "clock rate" is used to refer to the speed of the CPU.

    BIOS (pronounced /ba os/), in computing, stands for Basic Input/Output System.BIOS refers to the firmware code run by a personal computer when first powered on. The

    primary function of the BIOS is to identify and initiate component hardware, (such as

    hard drives, floppies, and CDs). This is to prepare the machine so other softwareprograms stored on various media can load, execute, and assume control of the PC[3]. This

    process is known as booting, or booting up, which is short forbootstrapping.

    Modem (from modulate and demodulate) is a devicethat modulates an analog carriersignal to encode digital information, and also demodulates such a carrier signal to decode

    the transmitted information. The goal is to produce a signal that can be transmitted easily

    and decoded to reproduce the original digital data. Modems can be used over any meansof transmitting analog signals, from driven diodes to radio. Faster modems are used by

    Internet users every day, notably cable modems and ADSL modems. In

    telecommunications, "radio modems" transmit repeating frames of data at very high data

    rates overmicrowaveradio links.

    Spamming is the abuse of electronic messaging systems to indiscriminately send

    unsolicited bulk messages. While the most widely recognized form of spam ise-mailspam, the term is applied to similar abuses in other media:instant messaging spam,Usenet newsgroup spam,Web search engine spam, spam in blogs,wiki spam,mobile

    phone messaging spam,Internet forum spam andjunk fax transmissions.

    A blog (aportmanteau ofweb log) is a website where entries are written in chronologicalorderand commonly displayed in reverse chronological order. As of September 2007,blog search engine Technorati was tracking more than 106 million blogs.

    http://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Motherboardhttp://en.wikipedia.org/wiki/Motherboardhttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Help:Pronunciationhttp://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/Firmwarehttp://en.wikipedia.org/wiki/Hard_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/Computer_softwarehttp://en.wikipedia.org/wiki/BIOS#_note-2%23_note-2http://en.wikipedia.org/wiki/Bootstrapping_(computing)http://en.wikipedi