Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Biometric Security Measures
|
A technique or device that examines a fingerprint, voice, pattern, or the iris or retna of the eye.
|
|
Cable Modem
|
A device that uses coaxial cable to send and recieve data.
|
|
Client
|
A computer that uses the services of another program.
|
|
Client/Server Network
|
Computer configuration in which one or more computers on the network acts as a server.
|
|
Communication Channels
|
Link from one computer to another through which data can be transmitted.
|
|
Digital Subscriber Line
|
An internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
|
|
Extranet
|
A network configuration that allows selected outside organizations to access internal information systems.
|
|
Firewall
|
A combination of hardware and software that creates a buffer between an internal and the internet to prevent unathorized access.
|
|
Hacker
|
Expert computer user who invades someone elses computer either for personal gain or simply for the satisfaction of being able to do it.
|
|
Hub
|
A junction where information arrives from connected computers or peripheral devices and is then forwarded in one of more directions to other computers andd devices.
|
|
Internet
|
The largest network used as a communication tool.
|
|
Intranet
|
A network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization.
|
|
Local Area Network (LAN)
|
A series of connected personal computers, workstations, and other devices, such as printers, or scanners, within a confined space, such as an office building.
|
|
Modem
|
Communication hardware device that facillitates the transmission of data.
|
|
Node
|
A device on the network.
|
|
Peer-to-Peer Network
|
Computer architecture in which all of the computers on a network are equal and there is no computer designed as the server.
|
|
Proxy Server
|
A server that acts as an intermediary between a user and the internet.
|
|
Public Switched Telephone Network (PSTN)
|
The world's collection of interconnected commercial and government-owned voice oriented sytems.
|
|
Router
|
A device that directs traffic on a network by dividing data into smaller packets that travel by differnet routes and then are reassmbled at their destination.
|
|
Server
|
A computer that handles request for data, file transfers, and other network services from other computers.
|
|
Server Operating System
|
High-end programs designed to provide network control and include special functions for connectiong computers and other devices into a network.
|
|
T-1 Line
|
A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitalized voice channels.
|
|
Wide Area Network (WAN)
|
Computer newtork that covers a large geographical area. Most WANs are made up of serveral connected LANs.
|
|
MIMAX
|
A recent wireless technology that can be deliver a maximum speeds of up to 7Mbps to your cell phone, home computer, or car.
|
|
Wireless Internet Service Provider
|
An ISP that provides connection speeds more than 30 times faster than dial up connection from 384 Kbps to 2.0 Mbps.
|