Term
|
Definition
An electrical device that sends or receives radio or television signals through electromagnetic waves. |
|
|
Term
|
Definition
Bandwidth is the rate of data transfer from a server to a PC, this means that bandwidth is the capacity for a system to transfer data over a connection. |
|
|
Term
|
Definition
Bluetooth is a wireless specification delivering short-range radio communication between electronic devices that are equipped with specialised Bluetooth chips |
|
|
Term
|
Definition
An electronic, handheld device primarily used for wireless communication via radio waves or satellite transmittion. |
|
|
Term
|
Definition
Dynamic Host Configuration Protocol controls how a client joins a network. In a model situation, the client sends a request for the appropriate networking information to the server of the network, and is sent back these details along with an IP address. |
|
|
Term
|
Definition
A hotspot is a public area where customers can access the Internet using wireless local area networks (WLAN). |
|
|
Term
|
Definition
HyperText Transfer Protocol over Secure Socket Layer (SSL) or Transport Layer Security (TLS). allow data to be transfered between computers without as much danger of connection eavesdropping or man in the middle packet sniffing.When you send secure information to a website (for example: payment information on eBay), your browser's HTTPS layer encrypts the data, upon the return of the websites acknowledgment, the HTTPS layer then decrypts the received information. |
|
|
Term
|
Definition
An IP Address, or Internet Protocol is a form of numerical identification. There are a total of 4.3 billion possible combinations of IPv4 addresses, which exist between 0.0.0.0 and 255.255.255.255. |
|
|
Term
|
Definition
Stands for Internet Service Provider. An ISP is a company that gives you the connection to the network of internet computers, so that your computer has the ability to communicate with other computers. The company gives users a gateway passage into the internet, without one internet access is impossible |
|
|
Term
|
Definition
A MAC (Media Access Control) address is an identification code, unique to each network interface device. It is used to allocate IP addresses within a network, ensuring that each different device has a different IP. [1]. A MAC address is in the format of six 2 digit codes separated by colons, and looks something like the following: 08:00:69:02:01:RP. To further improve the security of your WLAN network you need to enable and utilize MAC address filtering. |
|
|
Term
|
Definition
Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. |
|
|
Term
|
Definition
A modem is a device, that is used to transmit data for computers. |
|
|
Term
|
Definition
A radio channel is the process where signals are passed on through electromagnetic waves that are invisible. |
|
|
Term
|
Definition
A router is a computer whose software and hardware are usually tailored to the tasks of routing and forwarding information (Wikipedia, 2008)
The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each point-of-presence on the Internet. A router is often included as part of a network switch. |
|
|
Term
|
Definition
Tools found in most email programs whose purpose is to limit or control Internet junk mail.(vis)12 The most common method of preventing malware in general is to install and run malware detection and removal programs, such as Norton and Ad-Adware. These programs will identify most, if not all, malicious software files on a computer and proceed to take steps to remove it. |
|
|
Term
|
Definition
The SSID (Service Set Identifier) is a token, which identifies an 802.11 (Wi-Fi) network. The SSID is a secret key, which is set by the network administrator.(vis)1 |
|
|
Term
|
Definition
A switch, as it pertains to computers, is a networking device that connects and switches between networks.Hardware that decides how to route Internet transmissions. Switches are similar to software routers, but faster and less flexible. |
|
|
Term
|
Definition
Universal Serial Bus or Port, connection port on a computer that is universally compatible with many types of devices, such as, printers, speakers, mouse keyboards PDAs, Gamepads, Joysticks, Scanners, etc. USB was designed to allow the above mentioned peripherals to be connected using a single standardized interface socket. [1] Commonly used for plug and play devices, and are especially popular for data storage devices, such as Flash Drives or SD Card Readers. Three formats currently exist: USB 1.0, USB 1.1, USB 2.0, each with an increasing data transfer speed. Each newer format is compatible with previous formats (e.g. a USB 2.0 External Hard Drive is compatible with a computer operating USB 1.1 hardware and drivers), but the data transfer will only occur at the lowest common speed between the device and computer. [2] |
|
|
Term
Virtual Learning Enviorment |
|
Definition
A Virtual Learning Environment, or VLE, is software designed to enhance a students ability to learn online, by providing tools similar to those which are available in the classroom and facilitating easy distance learning. |
|
|
Term
|
Definition
Software described as "Virus Protection" is a piece of software, with the purpose of preventing the spread of viruses on a user's computer. |
|
|
Term
Web Conferencing Enviornment |
|
Definition
used to conduct live meeting or presentations over the internet. In a web conference, each participant sits at his or her own computer and is connected to other participants via the internet. This can be either a downloaded application on each of the attendees computers or a web-based application where the attendees will simply enter a URL (website address) to enter the conference. |
|
|
Term
|
Definition
WEP is short for Wired Equivalency Privacy and it is a security protocol for Wi-Fi networks. [1] It is a algorithm that is used to secure IEEE 802.11 wireless networks. [2] WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks.[8]
WPA is an acronym for Wi-Fi Protected Access, a wireless security standard that has been designed to improve upon the security features of WEP. [3] WPA is a certification program administered by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks [9] WPA2 is an acronym for Wi-Fi Protected Access 2. This is an improved upgrade to WPA. [4]
The advanced protocol, certified through Wi-Fi Alliance's WPA2 program, implements the mandatory elements of 802.11i. In particular, it introduces a new AES-based algorithm, CCMP, that is considered fully secure. |
|
|
Term
|
Definition
Wi-Max is a telecommunications technology that provides for the wireless transmission of data in a variety of ways, ranging from point-to-point links to full mobile cellular-type access. The technology provides the users with an idea of enjoying the broadband spped without the actual requirement of any wires or bulky network structures |
|
|
Term
|
Definition
Wi-Fi is a method of transmitting wireless data through microwaves. Using Wi-Fi one can not only connect to the internet but also to a wireless network(s) |
|
|