Term
|
Definition
(Local Area Network) Multiple personal computers connected on a network. (close to each other) |
|
|
Term
|
Definition
(Wide Area Network) A network that extends over a long distance. Each network site is a node on the network. (ex- St.Pete HS is a node to the WAN of Pinellas County Schools) |
|
|
Term
|
Definition
For a local-area network, a hierarchical model in which one or more computers act as dedicated servers and all the remaining computers act as clients. The server fills requests from clients for data and other resources. |
|
|
Term
|
Definition
A popular networking architecture developed in 1976 at Xerox with general principles that apply to all common network connections |
|
|
Term
|
Definition
A global interconnected network of thousands of networks linking academic, research, government, and commercial institutions, and other organizations and individuals. Also known as the Net. |
|
|
Term
|
Definition
A self-contained intraorganizational network that is designed using the same technology as the Internet. (intraorganizational= within a specific organization) |
|
|
Term
|
Definition
A private inter organizational system connecting the intranets of two or more companies in an E-Marketplace. |
|
|
Term
|
Definition
(Virtual Private Network): A network that uses encryption software to create secret “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet. |
|
|
Term
|
Definition
Programs or devices that decide how to route Internet transmissions. |
|
|
Term
|
Definition
Hardware that decides how to route Internet transmissions. Switches are similar to software routers, but faster and less flexible. (flexible= sent to a specific address) |
|
|
Term
|
Definition
: Devices that allow nodes on a local area network to communicate, though only a single message at a time can move across the network. |
|
|
Term
|
Definition
The quality of information that can be transmitted through a communication medium in a given amount of time. |
|
|
Term
|
Definition
: An internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections |
|
|
Term
|
Definition
High-capacity cable that uses light waves to carry information at blinding speeds. |
|
|
Term
|
Definition
A type of broadband internet connection that uses the same network of coaxial cables that delivers TV signals. |
|
|
Term
|
Definition
A network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and receive data through the air rather than through cables. |
|
|
Term
|
Definition
A type of wireless technology that enables mobile phones, handheld computers, and PCs to communicate with each other regardless of operating systems. |
|
|
Term
|
Definition
A form of distributed computing in which not files, but processing power is shared between networked computers. |
|
|
Term
|
Definition
A type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional super computing power normally used by military and research facilities in consumer oriented applications. |
|
|
Term
|
Definition
A set of rules for the exchange of data between a terminal and a computer or between two computers. |
|
|
Term
|
Definition
An individual responsible for maintaining a multi-user computer system. |
|
|
Term
|
Definition
Software that only allows user access according to the user’s needs. Some users can open only files that are related to their work. Some users are allowed read-only access files that they can see but not change. |
|
|
Term
|
Definition
A one-word name that you type to identify yourself when connecting- logging in- to a secure computer system, network, or email account. Sometimes called username or alias. |
|
|
Term
|
Definition
The most common security tool used to restrict access to computer systems. |
|
|
Term
|
Definition
Measurement of individual body characteristics, such as voiceprint or fingerprint; sometimes used in computer security |
|
|
Term
|
Definition
Software or hardware that guards against unauthorized access into an internal network; keeps internal network secure while allowing communication with the rest of the internet. |
|
|
Term
|
Definition
A server that sits between a client application such as a web browser and a real server. It intercepts all requests to the real server to see if it can fulfill the request itself. If not, it forwards the request to the real server. |
|
|
Term
|
Definition
Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it’s been reconstructed with a matching key. |
|
|
Term
|
Definition
(Secure Socket Layer): A protocol developed by Netscape for transmitting private documents via the Internet |
|
|
Term
|
Definition
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. |
|
|
Term
|
Definition
Software for monitoring the desktop and online activities of employees, family members, or other computer users. |
|
|
Term
|
Definition
Software that, for the most part, keeps offense and otherwise inappropriate Web content from being viewed by children, on-duty workers, and others. Done by blocked certain websites (with key words or a "black list") |
|
|
Term
|
Definition
A document that outlines the rules and practices of acceptable use on a computer network. |
|
|
Term
|
Definition
Someone who uses computer skills to gain unauthorized access to computer systems. Also sometimes used to refer to a particularly talented, dedicated programmer. |
|
|
Term
|
Definition
Unauthorized access and/or vandalism of computer systems; short for criminal hacking. |
|
|
Term
|
Definition
The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information. |
|
|
Term
|
Definition
Infusing false information into a DNS server resulting in a user’s request being redirected elsewhere in order to obtain personal or private information. |
|
|
Term
|
Definition
A process used to steal passwords online. |
|
|
Term
|
Definition
(Uninterruptable Power Supply): A hardware device that protects computers from data loss during power failures. |
|
|
Term
|
Definition
- Sharing hardware reduces cost
- Sharing data increases productivity
- Allows people to work together and communicate
|
|
|
Term
Disadvantages of Networks |
|
Definition
- Viruses can spread from machine to machine
- Privacy is an issue if proper levels of access are not in place
- The integrity of the data
|
|
|
Term
Three factors affecting Bandwidth |
|
Definition
- Amount of network traffic
- Type of file being transmitted
- Type of internet connection
|
|
|
Term
Responsibilities of a Systems Administrator |
|
Definition
- Adding and configuring new work stations
- Setting up user accounts
- Installing system-wide software
- Performing procedures to prevent viruses
- Allocating storage space
|
|
|
Term
Features of a good Password |
|
Definition
- No common words
- A mixture of letters and numbers
- Changed frequently
- Keep it a secret
|
|
|
Term
3 Conditions That Make Monitoring Software Ethically Okay |
|
Definition
- The owner of the software is the owner of the computer its installed in
- The owner of the software is a parent of the child
- The owner of the software must have consent of the users
|
|
|
Term
Advantages of Monitoring Software |
|
Definition
- Keeps workers on task, increasing productivity
- Avoids possible legal issues (porn, sexual harrassment)
|
|
|
Term
Advantages Of Filtering Software |
|
Definition
- Protects children from porn/hate sites
- Keeps workers/students on task
|
|
|
Term
Disadvantages of Filtering Software |
|
Definition
- Good sites may be blocked due to key words
- May be bias when choosing key words to filter
- Cultural differences regarding what is appropriate
- 1st ammendment- freedom of speech
|
|
|
Term
Purposes of a Proxy Server |
|
Definition
- Improve performance
- Filters requests
|
|
|
Term
|
Definition
- Maintain security
- Recover lost transactions
|
|
|