Term
|
Definition
802.11g applies to wireless LANs and provides 20+ Mbps in the 2.4 GHz band. 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. |
|
|
Term
|
Definition
(Radio Frequency) The range of electromagnetic frequencies above the audio range and below infrared light (from 10 kHz to 300 GHz). Except for infrared (IR) transmission, all wireless transmission uses RF, including AM and FM radio, TV, satellites, portable phones, cellphones and wireless networks. |
|
|
Term
|
Definition
An invisible band of radiation at the lower end of the visible light spectrum. With wavelengths from 750 nm to 1 mm, infrared starts at the end of the microwave spectrum and ends at the beginning of visible light. Infrared transmission typically requires an unobstructed line of sight between transmitter and receiver. Widely used in most audio and video remote controls, infrared transmission is also used for wireless connections between computer devices and a variety of detectors. |
|
|
Term
|
Definition
Short for Extensible Markup Language, a specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. |
|
|
Term
|
Definition
The Extensible HyperText Markup Language, or XHTML, is a markup language that has the same expressive possibilities as HTML, but a stricter, more verbose syntax. Whereas HTML is an application of SGML, a very flexible markup language, XHTML is an application of XML, a more restrictive subset of SGML. |
|
|
Term
|
Definition
n web page design, and generally for all markup languages based on SGML, such as HTML, XML, a well-formed element is one that is either opened and subsequently closed, an empty element, which in that case must be terminated, or is properly nested so that it does not overlap. |
|
|
Term
|
Definition
Short for World Wide Web Consortium, an international consortium of companies involved with the Internet and the Web. The W3C was founded in 1994 by Tim Berners-Lee, the original architect of the World Wide Web. The organization's purpose is to develop open standards so that the Web evolves in a single direction rather than being splintered among competing factions. |
|
|
Term
|
Definition
In Computer Programming Terminology, validation refers to the process of controlling that data inserted into an application satisfies pre-determined formats or complies with stated length and character requirements and other defined input criteria. |
|
|
Term
|
Definition
The HTML 4.01 Transitional DTD, which includes presentation attributes and elements that W3C expects to phase out as support for style sheets matures. Authors should use the Strict DTD when possible, but may use the Transitional DTD when support for presentation attribute and elements is required. |
|
|
Term
|
Definition
The HTML 4.01 Strict DTD, which excludes the presentation attributes and elements that W3C expects to phase out as support for style sheets matures. Authors should use the Strict DTD when possible, but may use the Transitional DTD when support for presentation attribute and elements is required. |
|
|
Term
|
Definition
(Standard Generalized Markup Language) An ISO standard for defining the format in a text document. Widely used in the publishing industry, an SGML document uses a separate Document Type Definition (DTD) file that defines the format codes, or tags, embedded within it |
|
|
Term
|
Definition
(HyperText Markup Language) The document format used on the Web. Web pages are built with HTML tags (codes) embedded in the text. HTML defines the page layout, fonts and graphic elements as well as the hypertext links to other documents on the Web. |
|
|
Term
|
Definition
The HTML 4.01 Frameset DTD should be used for documents with frames. This DTD is identical to the HTML 4.01 Transitional DTD except for the content model of the "HTML" element: in frameset documents, the "FRAMESET" element replaces the "BODY" element. |
|
|
Term
|
Definition
In computing, an HTML element indicates structure in an HTML document and a way of hierarchically arranging content. More specifically, an HTML element is an SGML element that meets the requirements of one or more of the HTML Document Type Definitions (DTDs). These elements have properties: both attributes and content, as specified (both allowable and required) according to the appropriate HTML DTD (for example, the HTML 4.01 strict DTD). |
|
|
Term
|
Definition
Short for document type definition. A DTD states what tags and attributes are used to describe content in an SGML, XML or HTML document, where each tag is allowed, and which tags can appear within other tags. |
|
|
Term
|
Definition
Used typically in reference to a computer language to mean a command or statement in the language that is going to be made invalid or obsolete in future versions. |
|
|
Term
|
Definition
Cascading Style Sheets (CSS) is a stylesheet language used to describe the presentation of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can be applied to any kind of XML document, including SVG and XUL. The CSS specifications are maintained by the World Wide Web Consortium (W3C). |
|
|
Term
|
Definition
In computing, attributes are entities that define properties of objects, elements, or files. Attributes usually consist of a name (or key) and value. For example, in computer graphics, line objects can have different kinds of attributes such as thickness (with real values), color (with descriptive values such as brown or green or values defined in a certain color model, such as RGB), dashing attributes, etc. |
|
|
Term
|
Definition
Short horizontal lines added to the tops and bottoms of traditional typefaces, such as Times Roman. |
|
|
Term
|
Definition
A typeface style without serifs, which are the short horizontal lines added at the tops and bottoms of the vertical member of the letter. Helvetica is a common sans-serif font. |
|
|
Term
|
Definition
Using different widths for different characters. In a proportionally spaced font, the letter I is narrower than the letter q and the letter m wider. |
|
|
Term
|
Definition
In typography, a unit equal to 1/72nd of an inch, used to measure the vertical height of a printed character. |
|
|
Term
|
Definition
Refers to fonts in which each character has the same width. |
|
|
Term
|
Definition
Type style with characters slanted upward to the right, used to emphasize a word or passage. |
|
|
Term
|
Definition
A set of fonts of the same typeface in assorted sizes, including bold, italic and bold italic variations. |
|
|
Term
|
Definition
A set of type characters of a particular typeface design and size. Each typeface, such as Times Roman, Helvetica and Arial,is typically made available in four variations: normal weight, bold, italic and bold italic. |
|
|
Term
|
Definition
The primary computer storage device, which spins, reads and writes one or more fixed disk platters |
|
|
Term
|
Definition
Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files |
|
|
Term
|
Definition
Short for floppy disk drive (FDD), a disk drive that can read and write to floppy disks. |
|
|
Term
|
Definition
A device that holds and reads CD-ROM discs. CD-ROM drives, which today typically means a CD-RW drive that is a combo CD-ROM, CD-R and CD-RW drive, come in a variety of speeds. |
|
|
Term
|
Definition
A self-contained operating environment that behaves as if it is a separate computer. For example, Java applets run in a Java virtual machine (VM) that has no access to the host operating system. |
|
|
Term
|
Definition
The software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer. The operating system (OS) acts as a host for application programs that are run on the machine. As a host, one of the purposes of an operating system is to handle the details of the operation of the hardware. This relieves application programs from having to manage these details and makes it easier to write applications. |
|
|
Term
|
Definition
Computer program that acts as an intermediary between the operating system and a device such as a disk drive, video card, printer, or keyboard. The driver must contain a detailed knowledge of the device, including its set of specialized commands. |
|
|
Term
|
Definition
In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks. |
|
|
Term
|
Definition
A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. |
|
|
Term
|
Definition
In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful. The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network. |
|
|
Term
|
Definition
Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. |
|
|
Term
|
Definition
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user?s information |
|
|
Term
|
Definition
A program routine that destroys data when certain conditions are met; for example, it may reformat the hard disk or insert random bits into data files on a certain date or if a particular employee record is missing from the employee database. Most viruses are logic bombs because they deliver their payload after a specific latency or when a trigger event occurs. |
|
|
Term
|
Definition
The condition wherein the data transferred to a buffer exceeds the storage capacity of the buffer and some of the data ?overflows? into another buffer, one that the data was not intended to go into. Since buffers can only hold a specific amount of data, when that capacity has been reached the data has to flow somewhere else, typically into another buffer, which can corrupt data that is already contained in that buffer. Malicious hackers can launch buffer overflow attacks wherein data with instructions to corrupt a system are purposely written into a file in full knowledge that the data will overflow a buffer and release the instructions into the computer?s instructions. |
|
|
Term
|
Definition
A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. |
|
|
Term
|
Definition
(Public Key Infrastructure) A framework for creating a secure method for exchanging information based on public key cryptography. The foundation of a PKI is the certificate authority (CA), which issues digital certificates that authenticate the identity of organizations and individuals over a public system such as the Internet. |
|
|
Term
|
Definition
(Pretty Good Privacy) A data encryption program from PGP Corporation, Palo Alto, CA (www.pgp.com). Published as freeware in 1991 and widely used around the world for encrypting e-mail messages and securing files. For e-mail, PGP sends the key and the encrypted message at the same time. It encrypts the key using a public key algorithm such as RSA and encrypts the message using a secret key algorithm such as IDEA (the original), CAST5, Triple DES and AES. On the receiving side, the secret key (using the public key method) is decrypted first so it can be used to decrypt the message. |
|
|
Term
|
Definition
The quality of correctness, completeness, wholeness, soundness and compliance with the intention of the creators of the data. It is achieved by preventing accidental or deliberate but unauthorized insertion, modification or destruction of data in a database. Data integrity is one of the six fundamental components of information security. |
|
|
Term
|
Definition
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. |
|
|
Term
|
Definition
The reversible transformation of data from the original (the plaintext) to a difficult-to-interpret format (the ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Encryption uses an encryption algorithm and one or more encryption keys. |
|
|
Term
|
Definition
Restrictions on the accessibility and dissemination of information. Confidentiality is one of the six fundamental components of information security |
|
|
Term
|
Definition
The accessibility of a system resource in a timely manner; for example, the measurement of a system's uptime. Availability is one of the six fundamental components of information security. |
|
|
Term
|
Definition
Verifying the identity of a user logging onto a network. Passwords, digital certificates, smart cards and biometrics can be used to prove the identity of the client to the network. Passwords and digital certificates can also be used to identify the network to the client. |
|
|
Term
|
Definition
Computer files containing details of amendments to records, which may be used in the event of system recovery being required. The majority of commercial systems feature the creation of an audit log. Enabling this feature incurs some system overhead, but it does permit subsequent review of all system activity, and provide details of: which User ID performed which action to which files when etc. |
|
|
Term
|
Definition
(Transmission Control Protocol/Internet Protocol) Standard Internet communications protocols that allow digital computers to communicate over long distances. The Internet is a packet-switched network, in which information is broken down into small packets, sent individually over many different routes at the same time, and then reassembled at the receiving end. TCP is the component that collects and reassembles the packets of data, while IP is responsible for making sure the packets are sent to the right destination. |
|
|
Term
|
Definition
In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software, or a combination of the two. At the lowest level, a protocol defines the behavior of a hardware connection. |
|
|
Term
|
Definition
Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. |
|
|
Term
|
Definition
(File Transfer Protocol) A protocol used to transfer files over a TCP/IP network (Internet, Unix, etc.). For example, after developing the HTML pages for a Web site on a local machine, they are typically uploaded to the Web server using FTP. |
|
|
Term
|
Definition
CPU or central processing unit, is an older term for processor and microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs. |
|
|
Term
|
Definition
An octet is 8 bits. It is equivalent to a byte, as long as the byte is also 8 bits. Bytes range from 4 - 10 bits, but octets are always 8 bits. |
|
|
Term
|
Definition
In mathematics and computer science, base-16, hexadecimal, or simply hex, is a numeral system with a radix or base of 16, usually written using the symbols 0?9 and A?F or a?f. |
|
|
Term
|
Definition
The binary numeral system (base 2 numerals) represents numeric values using two symbols, typically 0 and 1. Owing to its straightforward implementation in electronic circuitry, the binary system is used internally by virtually all modern computers. |
|
|
Term
|
Definition
Acronym for the American Standard Code for Information Interchange. Pronounced ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another. |
|
|
Term
|
Definition
In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. |
|
|
Term
|
Definition
A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP?s network. Routers are located at gateways, the places where two or more networks connect.Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. |
|
|
Term
|
Definition
(MOdulator-DEModulator) Until the late 1990s, the term stood for a device that allowed a computer or terminal to transmit data over a standard dial-up telephone line. Since the advent of high-speed cable and DSL connections, modem may refer to devices for low-speed dial-up or high-speed broadband. |
|
|
Term
|
Definition
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. |
|
|
Term
|
Definition
(Virtual Private Network) A private network that is configured within a public network (a carrier's network or the Internet) in order to take advantage of the economies of scale and management facilities of large networks. VPNs are widely used by enterprises to create wide area networks (WANs) that span large geographic areas, to provide site-to-site connections to branch offices and to allow mobile users to dial up their company LANs. |
|
|
Term
|
Definition
A peer-to-peer (or P2P) computer network is a network that relies primarily on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively low number of servers. P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes. Sharing content files (see file sharing) containing audio, video, data or anything in digital format is very common, and realtime data, such as telephony traffic, is also passed using P2P technology. |
|
|
Term
|
Definition
National LambdaRail is a high-speed national computer network in the United States that runs over fiber-optic lines, and is the first transcontinental Ethernet network.National LambdaRail is a university-based and -owned initiative, in contrast with Abilene and Internet2, which are university-corporate sponsorships. |
|
|
Term
|
Definition
Computer networks that usually cover a limited range, say, within the boundary of a building. A computer network is two or more computers that communicate with each other through some medium. The primary usage of local-area networks (LANs) is the sharing of hardware, software, or information, such as data files, multimedia files, or electronic mail. |
|
|
Term
|
Definition
A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. It is one of the most widely implemented LAN standards. |
|
|
Term
|
Definition
(Concurrent Versions System) A version control system for Unix that was initially developed as a series of shell scripts in the mid-1980s. CVS maintains the changes between one source code version and another and stores all the changes in one file. It supports group collaboration by merging the files from each programmer. |
|
|
Term
|
Definition
A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ). Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power. |
|
|
Term
|
Definition
High-speed transmission. The term commonly refers to Internet access via cable and DSL, which is considerably faster than analog dial-up. Broadband always referred to a higher-speed connection, but the speed threshold has varied. Widely employed in companies, the 1.5 Mbps T1 line was often considered the starting point, while the FCC defines broadband as a minimum upload speed of 200 Kbps. |
|
|
Term
|
Definition
BitTorrent is a file distribution system used for transferring files across a network of people. As you download a file, BitTorrent places what you download on upload for other users; when multiple people are downloading the same file at the same time they upload pieces of the file to each other. BitTorrent pieces together the file you are downloading, to where the first part of a file you get may be the last part someone else gets. As you continue to retrieve the file, BitTorrent also uploads data to other users. |
|
|
Term
|
Definition
The part of a network that handles the major traffic. It employs the highest-speed transmission paths in the network and may also run the longest distances. Smaller networks are attached to the backbone, and networks that directly connect to the end user or customer are called "access networks." |
|
|
Term
|
Definition
An imaginary memory area supported by some operating systems (for example, Windows but not DOS) in conjunction with the hardware. You can think of virtual memory as an alternate set of memory addresses. Programs use these virtual addresses rather than real addresses to store instructions and data. |
|
|
Term
|
Definition
A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with PINs that connect to the computer motherboard. |
|
|
Term
|
Definition
ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. |
|
|
Term
|
Definition
Acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printer |
|
|
Term
|
Definition
A DIMM (dual in-line memory module) is a double SIMM (single in-line memory module). Like a SIMM, it's a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect it to the computer motherboard. |
|
|
Term
|
Definition
A collaborative Web site comprises the perpetual collective work of many authors. Similar to a blog in structure and logic, a wiki allows anyone to edit, delete or modify content that has been placed on the Web site using a browser interface, including the work of previous authors. |
|
|
Term
|
Definition
A Uniform Resource Locator is an Internet address (for example, http://www.hmco.com/trade/), usually consisting of the access protocol (http), the domain name (www.hmco.com), and optionally the path to a file or resource residing on that server (trade) |
|
|
Term
|
Definition
(Uniform Resource Identifier) The addressing technology for identifying resources on the Internet or private intranet. URIs were originally defined as two types: Uniform Resource Locators (URLs) which are addresses with network locations, and Uniform Resource Names (URNs), which are persistent names that are address independent. |
|
|
Term
|
Definition
Refers to the absence of restrictions placed on the type of content carried over the Internet by carriers and ISPs that run the major backbones. It implies that all packets are delivered on a first-come, first-served basis and no priority is given to traffic coming from any Internet venue above and beyond that of another. |
|
|
Term
|
Definition
An ISP (Internet service provider) is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting. |
|
|
Term
|
Definition
Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual. Typically updated daily, blogs often reflect the personality of the author |
|
|
Term
|
Definition
(Application Service Provider) An organization that hosts software applications on its own servers within its own facilities. Customers rent the use of the application and access it over the Internet or via a private line connection. Also called a "commercial service provider." The Web browser, acting as a universal client interface, has fueled this "on-demand software" market. |
|
|
Term
|
Definition
(NT File System) An optional file system for Windows NT, 2000 and XP operating systems. NTFS is the more advanced file system, compared to FAT32. It improves performance and is required in order to implement numerous security and administrative features in the OS. |
|
|
Term
|
Definition
An area on a hard disk or floppy disk where information is stored about the physical location of each piece of every file on the disk and about the location of unusable areas of the disk. File Allocation Table (FAT) is a partially patented file system developed by Microsoft for MS-DOS and is the primary file system for consumer versions of Microsoft Windows up to and including Windows Me. |
|
|
Term
|
Definition
a server is a computer system that provides services to other computing systems?called clients?over a network. The term server can refer to hardware (such as a Sun computer system) or software (such as an RDBMS server). |
|
|
Term
|
Definition
A high-speed computer in a network that stores the programs and data files shared by users. It acts like a remote disk drive. The difference between a file server and an application server is that the file server stores the programs and data, while the application server runs the programs and processes the data. |
|
|
Term
|
Definition
A dedicated server or a service within a server that provides DNS name resolution in an IP network. It turns names for Web sites and network resources into numeric IP addresses. DNS servers are used in large companies, in all ISPs and within the DNS system in the Internet, a vital service that keeps the Internet working. |
|
|
Term
|
Definition
A computer designed for desktop use; usually comprises, at a minimum, a central processing unit (CPU), a monitor, and a keyboard as separate units, connected by special cables. |
|
|
Term
|
Definition
A single alphabetic letter, numeric digit, or special symbol such as a decimal point or comma. A character is equivalent to a byte; for example, 50,000 characters take up 50,000 bytes. The word "character" itself takes up nine bytes. |
|
|
Term
|
Definition
A symbol used in Windows, starting with Windows 95, that maintains a short version of a long file or directory name for compatibility with Windows 3.1 and DOS. For example, the short version of a file named "Letter to Joe" would be LETTER~1. Then "Letter to Pat" becomes LETTER~2. |
|
|
Term
|
Definition
The backslash symbol (\) is used as a separator between folder and file names in DOS, Windows and OS/2 when the full path to a file is written out. For example, the path c:\cde\cde.exe points to the CDE.EXE file in the CDE folder on the C: drive. |
|
|
Term
|
Definition
Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user?s name from the user?s domain name, both of which are necessary in order to transmit e-mails. For example, the e-mail address webmaster@webopedia.com indicates that the user named webmaster receives e-mail "at," or "@," the webopedia.com domain. |
|
|
Term
|
Definition
The forward slash, or slash, character (/) is the divide symbol in programming and on calculator keyboards. For example, 10 / 7 means 10 divided by 7. In Unix paths, which have become popular due to Internet addresses, the slash separates the elements of the path as in www.company.com/news/previous/abc.html. |
|
|
Term
|
Definition
In HTML, the ampersand is used as a prefix to a mnemonic name, followed by a semicolon, for foreign letters and special characters such as the copyright and trademark symbols. When an HTML tag must be described on an HTML page rather than rendered as actual HTML, the ampersand precedes lt (less than) or gt (greater than), followed by a semicolon. |
|
|
Term
|
Definition
USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices (such as audio players, joysticks, keyboards, telephones, scanners, and printers). |
|
|
Term
|
Definition
A socket on a computer used to connect a modem, data acquisition terminal or other serial device via a slow-speed serial interface. |
|
|
Term
|
Definition
(Small Computer System Interface) Pronounced "scuzzy." SCSI is a hardware interface that allows for the connection of up to 15 peripheral devices to a single PCI board called a "SCSI host adapter" that plugs into the motherboard. |
|
|
Term
|
Definition
A standard developed by the Electronic Industries Association that governs the interface between data processing and data communications equipment, and is widely used to connect microcomputers to peripheral devices. |
|
|
Term
|
Definition
A socket on a computer used to connect a printer or other parallel device via the computer's parallel interface. |
|
|
Term
|
Definition
A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network. |
|
|
Term
|
Definition
IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. |
|
|
Term
|
Definition
FireWire is Apple Computer's version of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer. FireWire provides a single plug-and-socket connection on which up to 63 devices can be attached with data transfer speeds up to 400 Mbps (megabits per second). |
|
|
Term
|
Definition
In DOS systems, the name of a serial communications port. DOS supports four serial ports: COM1, COM2, COM3, and COM4. |
|
|
Term
|
Definition
Device on a computer's motherboard that provides a data path between the CPU and attached devices (keyboard, mouse, disk drives, video cards, etc.). |
|
|