Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Biometric Security Measures
|
A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
|
|
Cable Modem
|
A device that uses coaxial cable to send and recieve data.
|
|
Client
|
A computer that uses the services of another program.
|
|
Client/Server Network
|
Computer configuration in which one or more computers on the network acts as a server.
|
|
Communication Channels
|
Link from one computer to another through which data can be transmitted.
|
|
Digital Subscriber Line (DSL)
|
An Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
|
|
Extranet
|
A network configuration that allows selected outside organizations to access internal information systems.
|
|
Firewall
|
A combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access.
|
|
Hacker
|
Expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it.
|
|
Hub
|
A junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices.
|
|
Internet
|
The largest network used as a communication tool.
|
|
Intranet
|
A nerwork designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization.
|
|
Local Area Network (LAN)
|
A series of connected personal computers, workstations, and other devices, such as printers, or scanners, within a confined space, such as an office building.
|
|
Modem
|
Communications harware device that facilitates the transmission of data.
|
|
Node
|
A device on the network.
|
|
Peer-to-peer Network
|
Computer architecture lin which all of the computers on a network are equal and there is no computer designated as the server.
|
|
Proxy Server
|
A server that acts as an intermediary between a user and the Internet.
|
|
Public Switched Telephone Network (PSTN)
|
The world's collection of interconnected commercial and government owned voice-oriented systems.
|
|
Router
|
A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
|
|
Server
|
A computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients.)
|
|
Server Operating System
|
High-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
|
|
T-1 Line
|
A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels.
|
|
Wide Area Network (WAN)
|
Computer network that covers a large geographical area. Most WAN's are made up of several connected LAN's.
|
|
WiMAX
|
A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.
|
|
Wireless Internet Service Provider (WISP)
|
An ISP that provides connection speeds more than 30 times faster than dial-up connections-from 384 Kbps to 2.0 Mbps.
|
|
Wireless LAN (WLAN)
|
A variation of a LAN that uses no physical wires.
|