Term
|
Definition
Local Area Network, or multiple personal computers connected on a network. Examples are any variety of interconnected computer and peripherals using wired and wireless connections. |
|
|
Term
|
Definition
A Wide Area Network, or a network of LANs that extends over a long distance. The best example is the internet. |
|
|
Term
|
Definition
Computers in a network program that are not acting as dedicated servers. They are often part of the client/server model, a hierarchical model in which a server shares information with a client computer. Sometimes a peer to peer model is used and every computer on the network is both a server and client. |
|
|
Term
|
Definition
A computer especially designed to provide software and other resources to other computers over a network. It always provides the information to a client in the client/server model of networking. |
|
|
Term
|
Definition
A popular networking architecture developed in 1976 at Xerox; it has become an industry standard. This is the type of network cable most networked computers today are connected to. Almost every new PC includes an ethernet port on teh main circuit board; older PCs have network cards that contain ethernet ports. |
|
|
Term
|
Definition
Physical proximity to a person, or knowledge about that person, a common theme in privacy discussions. People need a certain amount of vacy to maintain their dignity and freedom. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A one-word name that you type to identify yourself when connectingÑlogging inÑto a secure computer system, network, or email account. Sometimes called login name or alias. |
|
|
Term
|
Definition
The most common security tools used to restrict access to computer systems. It can be a login that you use to identify yourself with. Passwords are very common to restrict access to personal accounts. |
|
|
Term
|
Definition
A software or hardware "gate" that protects internal networks from unauthorized access.It is very useful in restricting access from viruses and malware that may infect computers. It is basically first line defense against such theats. Examples include Norton Antispyware software which can be downloaded onto one's PC. |
|
|
Term
|
Definition
A user who has additional access privileges, such as permission to install software applications and change system settings. This can make it easier for people to update and add features to their websites over time. An example of this is Webs.com which alows people to be the systemadministrater of their own websites. |
|
|
Term
|
Definition
A hardware device that protects computers from data loss during power failures.It stands for Uninterupted Power Supply. It can be very useful when the power goes out because no data is lost. Many households make the most of this technology by protecting their data. |
|
|
Term
|
Definition
This stands for electronic data interchange, or a set of specifications for conducting basic business transactinos over private networks. More specifically, EDI is the direct, computer to computer exchange of standardized, common business transaction documents, such as purchase orders and invoices, between business partners, suppliers, and customers. EDI uses international standards for data formatting that enable companies to exchange large amounts of information in real time around the world. |
|
|