Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
biometric security measures
|
-refers to the identification of humans by their characteristics and traits. used in computer science as a form of identification and access control
|
|
cable modem
|
-device that uses coaxil cable to send and recieve data
|
|
client
|
-computer that uses the services of another program
|
|
client/ server network
|
-computer configuration in which one or more computers on the network acts as a server
|
|
communication channels
|
-link from one computer to another through which data can be transmitted
|
|
digital subscriber line (DSL)
|
-internet connection technology that provides for the trandfer of information to a computer at a high-speed bandwidth over ordianry copper telephone lines
|
|
extrant
|
-netwrok configuration that allows selected outsidce organizations to access interl information systems
|
|
firewall
|
-combination of hardware and software that creates a buffer between an internal network and the internet to prevent unauthorized access
|
|
hacker
|
-expert computer user who invades someones else's computer either for personal gain or simply for the satisfaction of being able to do it
|
|
hub
|
-junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices
|
|
Internet
|
-largest network used as a communicaton tool
|
|
intranet
|
-network designed for the exclusive use of computer users within an organization that cannot be accessed by users aoutside the organization
|
|
local area network
|
-series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building
|
|
modem
|
-communications hardware device that facilitates the transmission of data
|
|
node
|
-a device on the network
|
|
peer-to peer network
|
-computer architecture in which all of the computers on a network are equal and there is no computer designated as the server
|
|
proxy server
|
-server that acts as an intermediary between a user and the internet
|
|
public switched telephone network
|
-the world's collection of interconnected commercial and the governmentowned voice-oriented systems
|
|
router
|
-device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
|
|
server
|
-computer that handles requestes for data, e-mail, file transfers, and other network services from other computers (clients)
|
|
server operating system
|
-high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
|
|
T-1 line
|
-a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitalized voice channels
|
|
wide area network
|
-computer network that covers a large geographical area. most WANs are made up of several connected LANs
|
|
wireless internet service provider
|
-an ISP that provides connection speeds more than 30 times faster than dial-up connections-from 384 Kbps to 2.0 Mbps
|
|
wireless LAN (WLAN)
|
-a variation of a LAN that uses no physical wires
|
|
wiMAX
|
telecommunications protocol that provides fixed and fully mobile internet
|