Term
|
Definition
method of verifyijng a person's identity & protect systems from unauthorized access |
|
|
Term
|
Definition
use of biological information such as fingerprint, retina scans, etc for authenticating user |
|
|
Term
|
Definition
computer system or application that acts as an intermediary for requests from clients seeking resources from other servers |
|
|
Term
|
Definition
Advanced Encryption Standard = a specification established by the US National Institute of Standards and Technology (NIST) 2001 |
|
|
Term
|
Definition
copies of data and files for redundancy in case of need for disaster recovery |
|
|
Term
|
Definition
rules we use to determine right and wrong things to do in our lives. |
|
|
Term
|
Definition
an external rule that, if violated, is punishable by society |
|
|
Term
|
Definition
2 or more computers connected to share information |
|
|
Term
|
Definition
communications medium capable of carrying a large amount of data at fast speeds |
|
|
Term
|
Definition
communications medium capable of carrying a small amount of data at slower speeds |
|
|
Term
|
Definition
modulator - demodulator = I/O device used to converts digital to analog for transmitting and converts analog to digital when receiving |
|
|
Term
|
Definition
copper = twisted pair, coaxial; fiber optic cable |
|
|
Term
|
Definition
infrared, laser, require Direct Line of Sight versus radio frequency (WIFI) and Bluetooth and cellular |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
metropolitan area network |
|
|
Term
|
Definition
|
|
Term
|
Definition
network housed within an organization to serve internal users. Protected by firewall |
|
|
Term
|
Definition
extension of intranet that allows specified external users including customers, partners to access internal applications and data via the Internet |
|
|
Term
|
Definition
layout or pattern by which a network is organized |
|
|
Term
|
Definition
computers and resources linked in a single line of cable with two endpoints |
|
|
Term
|
Definition
device used to absorb signals to reduce network traffic by minimizing reflections at the end of a network cable. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
aka: hub and spoke topology with one central hub as a switching station between multiple computers. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
no hub but there is a "token" which must be empty to carry data from one computer to another in the ring. Review Fault Tolerance concerns. |
|
|
Term
|
Definition
|
|
Term
|
Definition
any network connections box |
|
|
Term
|
Definition
basic connection box with no intelligence so 'broadcasting' is a problem causing increased network traffic |
|
|
Term
|
Definition
connecting box withintelligence to inspect data packets as they are received, determining the source and destination device of that packet and forwarding it to the appropriate destination. |
|
|
Term
|
Definition
an amplifier that increases the strength of the signal and then sends the amplified signals along the network path. |
|
|
Term
|
Definition
concentrator connecting different networks together to carry messages to intended destinations. Routers determine the shortest path your data can travel from computer A to computer B.
A router is an application device that has ports, which the computers and servers connect to. Routers are programmed with routing tables to determine the shortest possible path between Computer A and Computer B. A routing table contains a list of IP addresses that a router can connect to transfer data. It is sophisticated enough to determine the number of possible "hops" from one computer to another. |
|
|
Term
|
Definition
consisting of hardware and software allowing communications between two similar networks. |
|
|
Term
|
Definition
a single point of access to computers outside your network. Connects different kinds of networks together. Exit and Entry points. |
|
|