network
A computer system that links two or more computers.
Security, privacy and anonymity
May be hacked or intruded, network must be secure
wireless network
A network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and receive data through the air rather than through cables.
A wireless network poses a risk to the user, other internet user can link to the connection if there is no password
Ethernet
A popular networking architecture developed in 1976 at Xerox.
Wi-Fi
A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.
Equality of access: you must be in a Wi-fi zone/area in order to use wi-fi internet.
local area network (LAN)
Multiple personal computers connected on a network.
Secure any computer in the local area may be able to login to your network alos for LAN AND WAN
metropolitan area network (MAN)
A service that links two or more LANs within a city.
wide area network (WAN)
A network that extends over a long distance. Each network site is a node on the network.
node
Each computer and shared peripheral on a local-area network.
routers
Programs or devices that decide how to route Internet transmissions.
Equality of Access one mu st have a router in order to use wireless internet
fiber-optic cable
High-capacity cable that uses light waves to carry information at blinding speeds.
client/server model
For a local-area network, a hierarchical model in which one or more computers act as dedicated servers and all the remaining computers act as clients. The server fills requests from clients for data and other resources.
Control: the server controls the outgoing request from the datas and must fulfill them
access
Physical proximity to a person, or knowledge about that person, a common theme in privacy discussions.
This applies to Equality of Access( internet or computer software or programs.)
phishing
The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.
Security: One may fall into a scam and may accidentally give out a private number (credit, ) to scammers
passwords
The most common security tools used to restrict access to computer systems.
SecuritY: Passwords are a security tool to restrict access9 equality of access)
virtual private network (VPN)
A network that uses encryption software to create secure “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.
Privacy and anonymity: creates secure network tnnels to prevent hacking
uninterruptible power supply (UPS)
A hardware device that protects computers from data loss during power failures.
electronic data interchange (EDI)
A set of specifications for conducting basic business transactions over private networks.
WIKI
A Web site that lets anyone with access to a Web browser to modify its pages. The best-known example is Wikipedia.
asynchronous communication
Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time.
real-time communication
Internet communication that enables you to communicate with other users who are logged on at the same time.
chat room
Public real-time teleconference.
bits per second (bps)
The standard unit of measure for modem speed.
Global Positioning System (GPS)
A defense department system with 24 satellites that can pinpoint any location on the Earth.
Internet telephony (IP telephony)
A combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages.
video teleconference
Face-to-face communication over long distances using video and computer technology.
voice mail
A telephone-based messaging system with many of the features of an email system.
network operating system (NOS)
Server operating system software for a local-area network.
Web host A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web.
Web Server: A service that provides the e-commerce software and expertise to run an online business.
Access: Physicial proximity to a person, or knowledge about that person, a common theme in privacy decisions.
Spam: internet junk mail
Sysadmin: A system administrator, systems administrator, or sysadmin, is a person ... The sysadmin is on call when a computer system goes down or malfunctionsnodes,: Each computer and shared peripheral on a local-network area
work station: A high-end desktop computer with massive computing power, though less exensive than a minicomputer. Workstations are the most powerful of the desktop computers.wireless access point; A Communication device, typically connected to a wired network, that is used to create a wireless network.
VoIP Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.
Monday, January 7, 2008
Posted by Muna at 11:34 AM 0 comments
Subscribe to:
Posts (Atom)
