1)Biometric Security Measures- used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surviellance.
2) Cable Modem-a type of network bridge and modern that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure
3) Client-an application or system that accesses a remote service on another computer system, known as a server, by way of a network
4) Client/ Server Network-a distributive application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients
5) Communication Channels-it is a pathway over which data are transferred between remote devices
6) Digital Subscriber Line (DSL)-a family of technologies that provides digital data transmission over the wires of a local telephone network
7) Extranet-a computer network that allows controlled access from the outside, for specific business or educational purposes
8) Firewall-a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
9) Hacker-a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism
10) Hub-a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment
11) Internet-a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
12) Intranet-a restricted computer network; a private network created using World Wide Web software
13) Local Area Conector (LAN)-the connections in the local area
14) Modem-is a device that modulates an analog carrier signal to encode digital information
15) Node-is a connection point, either a redistribution point or a communication endpoint
16) Peer-Peer Network-A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers
17) Proxy Server-a proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers
18) Public Switched Telephone Network (PSTN)-the network of the world's public circut switched telephone networks
19) Router-is an electronic device that intercepts signals on a computer network
20) Server- is a program that operates as a socket listener
21) Server Operating System-Server-oriented operating systems tend to have certain features in common that make them more suitable for the server environment
22) T-1 Line-refers to a specific type of copper or fiber topic telephone line that can carry more data than traditional telephone lines.
23) Wide area Network (WAN)-is a computer network that covers a broad area
24) WiMax-is a telecomunications protocol that provides fixed and fully mobile Internet access
25) Wireless Internet Service Provider(WISP)-internet service providers with networks built around wireless networking
26) Wireless LAN (WLAN) -links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet.
No comments:
Post a Comment