Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Biometric Security Measures
|
used to control network, laptop and remote access-easier to use, more accurate and cheaper
|
|
Cable Modems
|
a type of network bridge and modem that provides bidirectional data communication via radio frequency channels on a cable television infrastructure
|
|
Client
|
a computer or a computer program which depends heavily on some other computer (its server) to fulfill its traditional computational roles
|
|
Client/Server Network
|
a protocol in which there is a single server which listens for connections, usually on a specific port and one or more clients which connect to it
|
|
Communication Channels
|
Can't find definition
|
|
Digital Subscriber Line
|
Can't find
|
|
Extranet
|
an intranet that is partially accessible to authorized persons outside of a company or organization
|
|
Firewall
|
an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system
|
|
Hacker
|
a microcomputer user who attempts to gain unauthorized access to proprietary computer systems
|
|
Hub
|
any one of the holes in an electrical panel, into which connections may be plugged
|
|
Internet
|
a vast computer network linking smaller computer networks worldwide
|
|
Intranet
|
a computer network with restricted access, as within a company, that uses software and protocols developed for the Internet.
|
|
Local Area Network
|
a system for linking a number of microcomputers, terminals, work stations, etc. with each other or with a mainframe computer in order to share data, printers, information, programs, disks, etc.; usually confined to one office or building.
|
|
Modem
|
an electronic device that makes possible the transmission of data to or from a computer via telephone or other communication lines
|
|
Node
|
a centering point of component parts
|
|
Peer-to-Peer Network
|
network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network
|
|
Proxy Server
|
A server process that intercepts requests from a client, passes them to an origin server and returns the response to the client while performing various other operations in the process
|
|
Public Switched Telephone Network (PSTN)
|
wired phone system over which landline telephone calls are made-relies on circuit switching
|
|
Router
|
A device which forwards packets between networks
|
|
Server
|
a computer that makes services, as access to data files, programs, and peripheral devices, available to workstations on a network
|
|
Server Operating System
|
designed to provide platforms for multi-user, frequently business-critical, networked applications-the focus of such operating systems is security, stability and collaboration, rather than user interface.
|
|
T-1 Line
|
refers to specific types of copper or fiber optic telephone line that can carry more data than traditional telephone lines
|
|
Wide Area Network (WAN)
|
covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries
|
|
WiMAX
|
combines braodband and wireless, making high-speed broadband Internet access over a wireless connection
|
|
Wireless Internet Service Provider (WISP)
|
company that provides access to the wireless Internet
|
|
Wireless Local Area Network
|
connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area wirelessly
|