CS160 RR

Home | link | Final Online Exam | About Our School | PUP CAMPUS is located at Brgy Sta Rosa Mulanay, Quezon | Contact Us
Final Online Exam

NET Framework
is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform

Active Server Pages (ASP)

also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).

ACCESS
 is a global provider of advanced software technologies to the mobile and beyond-PC markets. With research and engineering centers throughout the world and a progressive company culture that emphasizes and nurtures innovation and creativity, ACCESS delivers unique solutions that bring value to its customers and partners and which help make life easier, more productive, and more enjoyable.

 access privileges
define the actions that can be performed on a provider and the database portlets owned by it. By default, you are granted the highest level of access, Manage access privilege, on any provider you create. With Manage privileges, not only can you perform actions on the provider and create database portlets within it, but you can grant access privileges to other OracleAS Portal developers. You can also delete the provider.

Active Hyperlink

Active hyperlink is a hyperlink that is currently selected in a Web browser. Some Web browsers indicate the active hyperlink by changing its color.

Administrator Resources

A supportive administrator can be a encouraging teachers in their decision to pursue National Board certification and insuring that they have the appropriate time and resources to devote to the creation of the National Board portfolio. The NBRC can help administrators find resources as well as offer advice about professional development for National Board candidates.

Authentication
 
 (from Greek: αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one

Data Administrators

 

The University Data Administrators are responsible for ensuring data is maintained by the University according to Board of Regents policies and procedures. Carla Reihe is the group coordinator.

Electronic commerce,
 
commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well

Electronic Government

refers to the simplification and the transaction of business processes by the use of information and communication technology (ICT) in the context of governance and public administration.

 encryption
 
 is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

Information technology (IT),

as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.

Information Technology (IT) Training Services

Enterprise Resource Planning (ERP)

GP's talented enterprise resource planning (ERP) training professionals are backed with 30+ years of industrial experience, which uniquely positions us not only to provide a well-thought-out training solution for any ERP package or related product (including "bolt-ons"), but also to provide software selection services and configuration advice. Our business is to learn about your business, so that the customized result not only syncs up with your system, but echoes your nuances and style.

Intellectual property (IP)

are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

ISO
electronic applications are now protected by a single login mechanism that allows you to be granted access without having to repeatedly retype your username and password.
 
Permission to access the applications listed on the  list of protected applications is given according to the roles you have been allocated in the ISO Global Directory.
 
Please notice that the single login mechanism works across any number of applications as long as they are opened in the same browser.

What is Malicious Code?

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applicatio

 PATCH

Hi there. We're Patch. No matter what's going on in your community, we've got it covered. Visit Patch to keep up with news, businesses, and events, check out photos and videos from around town, see what neighbors are up to, and get in on the conversation. If you think your community could use Patch,

a purge
 is the removal of people who are considered undesirable by those in power from a government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known as rehabilitation.

Access Remote PC
 
is a computer program that lets you access your PC from another PC via the Internet, LAN, or phone connection and work on your computer remotely as if you were sitting in front of it.

Social engineering
 
is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.

a spoofing attack
 
 is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

strong encryption

An encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.

UserID
 
provides a graphical layer that preserves your existing Safeguard or Guardian security investment and enables you to perform user management tasks on any node to which you are logged on.

Enter supporting content here

reynan_ramos17@yahoo.com