Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
biometric security measures
|
examine a fingerprint, a voice, pattern, or the iris or retina of an eye
|
|
cable modem
|
a device that uses coaxial cable to semd and recieve data
|
|
client
|
a computer that uses the services of another program
|
|
client/server network
|
computer configuration in which one or more computers on the network acts as a server
|
|
communication channels
|
link from one computer to another through which data can be transmitted
|
|
digital subscriber line (DSL)
|
an internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines
|
|
extranet
|
a network configuration that allows selected outside organizations to access internal information systems
|
|
firewall
|
a combination of h-ware and s-ware that creates a buffer b/w an internal network and the internet to prevent unauthorized access
|
|
hacker
|
expert computer user who invades another's computer either for personal gain or simply for the satisification of being able to do it
|
|
hub
|
a junction where info arrives from connected computers or periphial devices and is then forwarded in one or more directions to other computers and devices
|
|
Internet
|
The largest network used as a communication tool
|
|
Intranet
|
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
|
|
local area network (LAN)
|
a series of connected personal computers, workstations, and other devices, like printers or scanners, within a confined space, such as an office building
|
|
Modem
|
communication h-ware device that facilitates the transmission of data
|
|
node
|
a device on the network
|
|
peer-to-peer network
|
computer archictecture in which all of the computers on a network are equal and there is no computer designated as the server
|
|
proxy server
|
a server that acts as an intermediary b/w a user and the internet
|
|
Public Switched Telephone Network (PSTN)
. |
the worlds collection of interconnected commercial and government-owned voice-oriented systems
|
|
router
|
a device that directs traffic on network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
|
|
server
|
a computer that handles requests for data, email, file transfers, and other network services from other computers
|
|
server operating system
|
high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
|
|
T-1 line
|
a typ[e of fiber-optic telephone line that can transmit up to 1.554 megabits per second or can be used to transmit 24 digiitalized voice channels
|
|
wide area network (WAN)
|
computer network that covers a large geographical area. most are made up of several connected LANS
|
|
wireless Internet service provider
|
an ISP that provides conncection speeds more than 30 times faster than dial-up connections
|
|
WISP
|
.an ISP that provides conncection speeds more than 30 times faster than dial-up connections
|
|
wireless LAN (WLAN)
|
a variation of a LAN that uses no physical wires
|
|
Address Book
|
part of most e-mail programs;used to keep a list of contacts and their email addresses
|
|
archiving
|
process of backing up up email messages
|
|
attachment
|
a document, image, figure, or other file that you can attach to an email message
|
|
distribution list
|
list of email addresses you can use to send same message to a group
|
|
electronic mail (e-mail)
|
transmission of electronic messages over networks
|
|
e-mail address
|
the address of the email
|
|
instant messaging
|
form of electronic communication that allows ou to send and recieve text messages in real time from friends who are online
|
|
mailing list
|
list of email addresses you can use to send same message to a group
|
|
packets
|
broken down small chuncks
|
|
signature
|
text or graphics added to end of outgoing email meddages
|
|
spam
|
unsolicited emial junk mail
|
|
text messaging
|
using cell phone or other mobile devices to send and recieve written messages
|
|
user agent
|
software application installed on local PC,network, or Web, like email, text, and instant messaging programs
|
|
Windows Mail
|
email software provided with windows Vista
|