Term
|
Definition
A device that reads information from a magnetic strip on the back of a credit card-like access card. |
|
|
Term
|
Definition
A method to control which computer is allowed to use transmission media at a certain time. |
|
|
Term
|
Definition
In a network, a type of topology where the nodes participate in moving data through the network. |
|
|
Term
|
Definition
A server that acts as a repository for application software. |
|
|
Term
|
Definition
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network. |
|
|
Term
|
Definition
A server that keeps track of who's logging on to the network and which services on the network are available to each user. |
|
|
Term
|
Definition
A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall. |
|
|
Term
Biometric Authentication Device |
|
Definition
A device that uses some unique characteristic of human biology to identify authorized users. |
|
|
Term
|
Definition
A device that's used to send data between different collision domains in a network, depending on where the recipient device is located. |
|
|
Term
|
Definition
An attempt to access an account by repeatedly trying different passwords. |
|
|
Term
Bus (Linear Bus) Topology |
|
Definition
A system of networking connections in which all devices are connected in sequence on a single cable. |
|
|
Term
|
Definition
A characteristic of client/server networks where the server, not the individual user, coordinates data security. |
|
|
Term
Client/Server Network (Server-based Network) |
|
Definition
A type of network that uses servers to deliver services to computers that are requesting them (clients). |
|
|
Term
|
Definition
A server that is maintained by a hosting company and that is connected to networks via the Internet. |
|
|
Term
|
Definition
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service. |
|
|
Term
|
Definition
A server that handles all communications between the network and other networks, including managing Internet connectivity. |
|
|
Term
|
Definition
The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. An node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals. |
|
|
Term
|
Definition
When two computers send data at the same time and sets of data collide somewhere in the connection media. |
|
|
Term
|
Definition
A server that provides client computers with access to information stored in databases. |
|
|
Term
|
Definition
A characteristic of peer-to-peer networks where the individual user coordinates data security. |
|
|
Term
|
Definition
A server used to fulfill one specific function, such as handling e-mail. |
|
|
Term
|
Definition
Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed. |
|
|
Term
Electronic Data Interchange (EDI) |
|
Definition
The exchange of large amounts of data in a standardized electronic format. |
|
|
Term
|
Definition
A server whose sole function is to process and deliver incoming and outgoing e-mail. |
|
|
Term
|
Definition
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it. |
|
|
Term
|
Definition
A cable that transmits data at close to the speed of light along glass or plastic fibers. |
|
|
Term
|
Definition
A server that stores or manages files for network users or that acts as a storehouse for files that users can download. |
|
|
Term
|
Definition
Groups of data packets that are sent together in a package. |
|
|
Term
|
Definition
A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or system that contains something of great value. |
|
|
Term
|
Definition
Combining multiple topologies into one network. |
|
|
Term
|
Definition
Ensuring that information systems contain accurate information and are adequately secured against tampering. |
|
|
Term
|
Definition
A private network set up by a business or organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters. |
|
|
Term
|
Definition
A special signal sent to network nodes alerting them that a data collision has occurred. |
|
|
Term
|
Definition
A network in which the nodes are located within a small geographic area. |
|
|
Term
Media Access Control (MAC) Address |
|
Definition
The physical address, similar to a serial number, of each network adapter. |
|
|
Term
|
Definition
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol. |
|
|
Term
|
Definition
Person who maintains networks for businesses. |
|
|
Term
Network Operating System (NOS) |
|
Definition
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate. |
|
|
Term
|
Definition
The physical or logical arrangement of computers, transmission media (cable), and other network components. |
|
|
Term
Open Systems Interconnection (OSI) |
|
Definition
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks. |
|
|
Term
|
Definition
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network. |
|
|
Term
|
Definition
In a network, a type of topology where the nodes do nothing to move data along the network. |
|
|
Term
|
Definition
Any object that users carry to identify themselves and that grants them access to a computer system or facility. |
|
|
Term
|
Definition
A software holding area for print jobs. Also called a print spooler. |
|
|
Term
|
Definition
A server that manages all client-requested printing jobs for all printers on a network. |
|
|
Term
|
Definition
A set of rules for exchanging communications. |
|
|
Term
|
Definition
A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet). |
|
|
Term
|
Definition
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle. |
|
|
Term
|
Definition
A device that routes packets of data between two or more networks. |
|
|
Term
|
Definition
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes. |
|
|
Term
Shielded Twister-Pair (STP) Cable |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Virtual Private Network (VPN) |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Wireless Access Point (WAP) |
|
Definition
|
|
Term
Wireless Network Interface Card (Wireless NIC) |
|
Definition
|
|