Term
|
Definition
| method of verifyijng a person's identity & protect systems from unauthorized access |
|
|
Term
|
Definition
| use of biological information such as fingerprint, retina scans, etc for authenticating user |
|
|
Term
|
Definition
| computer system or application that acts as an intermediary for requests from clients seeking resources from other servers |
|
|
Term
|
Definition
| Advanced Encryption Standard = a specification established by the US National Institute of Standards and Technology (NIST) 2001 |
|
|
Term
|
Definition
| copies of data and files for redundancy in case of need for disaster recovery |
|
|
Term
|
Definition
| rules we use to determine right and wrong things to do in our lives. |
|
|
Term
|
Definition
| an external rule that, if violated, is punishable by society |
|
|
Term
|
Definition
| 2 or more computers connected to share information |
|
|
Term
|
Definition
| communications medium capable of carrying a large amount of data at fast speeds |
|
|
Term
|
Definition
| communications medium capable of carrying a small amount of data at slower speeds |
|
|
Term
|
Definition
| modulator - demodulator = I/O device used to converts digital to analog for transmitting and converts analog to digital when receiving |
|
|
Term
|
Definition
| copper = twisted pair, coaxial; fiber optic cable |
|
|
Term
|
Definition
| infrared, laser, require Direct Line of Sight versus radio frequency (WIFI) and Bluetooth and cellular |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| metropolitan area network |
|
|
Term
|
Definition
|
|
Term
|
Definition
| network housed within an organization to serve internal users. Protected by firewall |
|
|
Term
|
Definition
| extension of intranet that allows specified external users including customers, partners to access internal applications and data via the Internet |
|
|
Term
|
Definition
| layout or pattern by which a network is organized |
|
|
Term
|
Definition
| computers and resources linked in a single line of cable with two endpoints |
|
|
Term
|
Definition
| device used to absorb signals to reduce network traffic by minimizing reflections at the end of a network cable. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
| aka: hub and spoke topology with one central hub as a switching station between multiple computers. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
| no hub but there is a "token" which must be empty to carry data from one computer to another in the ring. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| any network connections box |
|
|
Term
|
Definition
| basic connection box with no intelligence so 'broadcasting' is a problem causing increased network traffic |
|
|
Term
|
Definition
| connecting box withintelligence to inspect data packets as they are received, determining the source and destination device of that packet and forwarding it to the appropriate destination. |
|
|
Term
|
Definition
| an amplifier that increases the strength of the signal and then sends the amplified signals along the network path. |
|
|
Term
|
Definition
concentrator connecting different networks together to carry messages to intended destinations. Routers determine the shortest path your data can travel from computer A to computer B.
A router is an application device that has ports, which the computers and servers connect to. Routers are programmed with routing tables to determine the shortest possible path between Computer A and Computer B. A routing table contains a list of IP addresses that a router can connect to transfer data. It is sophisticated enough to determine the number of possible "hops" from one computer to another. |
|
|
Term
|
Definition
| consisting of hardware and software allowing communications between two similar networks. |
|
|
Term
|
Definition
| a single point of access to computers outside your network. Connects different kinds of networks together. Exit and Entry points. |
|
|