1) Biometric Security Measures:Biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
2) Cable Modem: A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN) and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service.
3) Client:A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web.
4) Client/ Server Network:A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web.
5) Communication Channels: communication channels flow within the chain of command or task responsibility defined by the organisation.
6) Digital Subscriber Line (DSL):Digital Subscriber Line (DSL) technology is a modem technology that uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers.
7) Extranet:An extension of an institution's intranet, especially over the WorldWide Web, enabling communication between the institution and people it deals with, often by providing limited access to its intranet. 8) Firewall:Any of a number of security schemes that prevent unauthorized users from gaining access to a computer network or that monitor transfers of information to and from the network.
9) Hacker:A person who writes programs in assembly language or in system-level languages, such as C. The term often refers to any programmer, but its true meaning is someone with a strong technical background who is "hacking away" at the bits and bytes.
10) Hub:An Ethernet hub, active hub, network hub, repeater hub or hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model.
11) Internet:The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.
12) Intranet:A privately maintained computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.
13) Local Area Conector (LAN):Local Area Networks (LANs) are the small networks to which many business and home-computer user initially connect.
14) Modem:A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information.
15) Node: In communication networks, a node is a connection point, either a redistribution point or acommunication endpoint (some terminal equipment). The definition of a node depends on the network andprotocol layer referred to.
16) Peer-Peer Network:Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.
17) Proxy Server:In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers.
18) Public Switched Telephone Network (PSTN):The public switched telephone network (PSTN) also referred to as the plain old telephone service (POTS) is the network of the world's public circuit-switched telephone networks.
19) Router:A router is an electronic device that intercepts signals on a computer network. The router determines where the signals have to go.
20) Server:In computer networking, a server is a program that operates as a socket listener. The term server is also often generalized to describe a host that is deployed to execute one or more such programs
21) Server Operating System:Server-oriented operating systems tend to have certain features in common that make them more suitable for the server environment
22) T-1 Line:In telecommunications, T-carrier, sometimes abbreviated as T-CXR, is the generic designator for any of several digitally multiplexed telecommunications carrier systemsoriginally developed by Bell Labs and used in North America, Japan, and South Korea.
23) Wide area Network (WAN):A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries )
24) WiMax:WiMAX (Worldwide Interoperability for Microwave Access) is atelecommunications protocol that provides fixed and fully mobile Internet access. The current WiMAX revision provides up to 40 Mbit/s
25) Wireless Internet Service Provider(WISP):Wireless Internet Service Providers (WISPs) are Internet service providers with networks built around wireless networking.
26) Wireless LAN (WLAN):A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet.
Set#2
Address Book: An address book or a name and address book (NAB) is a book or a database used for storing entries called contacts.
Archiving: Archives; List of archives; Manuscript processing; Preservation (library andarchival science)
Attachment: Attachment theory is a psychological, evolutionary, and ethological theory concerning relationships between humans.
Distribution list: is a term sometimes used for a function of email clients where lists of email addresses are used to email everyone on the list at once.
Electronic Mail: Electronic mail, commonly called email or e-mail, is a method of exchanging digital messages across the Internet or other computer networks
e-mail address: An email address identifies an email mailbox to which email messages may be delivered. An example format of an email address is lewis@example.net
Instant Messaging: Instant messaging (IM) is a form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared software
Mailing List: A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Packets: a packet is a formatted unit of data carried by a packet mode computer network.
Signature: is a handwritten (and sometimes stylized) depiction of someone's name, nickname or even a simple "X" that a person writes on.
Set#3
ActiveX: a framework for defining reusable software components in a programming language independent way.
Client: is an application or system that accesses a remote service on another computer system, known as a server, by way of a network The term was first applied to devices
Cookie: a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user 's web browser
Digital Certificate: a public key certificate (also known as a digital certificate or identitycertificate) is an electronic document which uses a digital signature to bind a public key
Domain: an identification label that defines a realm of administrative autonomy, authority, or control in the Internet.
File Transfer Protocol: is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet.
Geographic Imaging: division of the National Geographic Society (NGS) headquartered in Washington, D.C., USA, is a stock photography agency
Hit: a strike (attack), the act of hitting someone or something to cause physical harm.
Home Page: has various related meanings to do with web sites: It most often refers to the initial or main web page of a web site, sometimes called the front page
Client: is an application or system that accesses a remote service on another computer system, known as a server, by way of a network The term was first applied to devices
Cookie: a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user 's web browser
Digital Certificate: a public key certificate (also known as a digital certificate or identitycertificate) is an electronic document which uses a digital signature to bind a public key
Domain: an identification label that defines a realm of administrative autonomy, authority, or control in the Internet.
File Transfer Protocol: is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet.
Geographic Imaging: division of the National Geographic Society (NGS) headquartered in Washington, D.C., USA, is a stock photography agency
Hit: a strike (attack), the act of hitting someone or something to cause physical harm.
Home Page: has various related meanings to do with web sites: It most often refers to the initial or main web page of a web site, sometimes called the front page
Hypertext markup Language: is the predominant markup language for web pages.
Hypertext Transfer Protocol: a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication
Internet Protocol Address: a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
Internet Service Provider: a company that offers its customers access to the Internet
Mosaic: the art of creating images with an assemblage of small pieces of colored glass, stone, or other materials
Podcast: a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication.
Portal: a general term describing an opening in the walls of a building, gate or fortification, and especially a grand entrance to an important structure
Really Simple Syndication: a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio
Social Networking Site: an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people
Uniform Resource Locator: a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Web 2.0: commonly associated with web applications that facilitate interactive systemic biases, interoperability, user-centered design and developing the World Wide Web.
Internet Protocol Address: a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
Internet Service Provider: a company that offers its customers access to the Internet
Mosaic: the art of creating images with an assemblage of small pieces of colored glass, stone, or other materials
Podcast: a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication.
Portal: a general term describing an opening in the walls of a building, gate or fortification, and especially a grand entrance to an important structure
Really Simple Syndication: a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio
Social Networking Site: an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people
Uniform Resource Locator: a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Web 2.0: commonly associated with web applications that facilitate interactive systemic biases, interoperability, user-centered design and developing the World Wide Web.
Web Cache: the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing
Website: a collection of related web pages, images, videos or other digital assets that are addressed
Webapp: In earlier types of cloud computing, each application had its own client program which served as its user interface and had to be separately installed on each user
Wiki: is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text
Blog: (a blend of the term web log is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary
Boolean Logic: a complete system for logical operations, used in many systems. It was named after George Boole, who first defined an algebraic system of logicCopyright: a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work, including the right to copy
Directories: A typical file system may contain thousands (or even hundreds of thousands) of folders.
Feed: a data format used for providing users with frequently updated content.
Secure Sockets Layer: Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that "provide communications security over the Internet TLS
Website: a collection of related web pages, images, videos or other digital assets that are addressed
Webapp: In earlier types of cloud computing, each application had its own client program which served as its user interface and had to be separately installed on each user
Wiki: is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text
Blog: (a blend of the term web log is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary
Boolean Logic: a complete system for logical operations, used in many systems. It was named after George Boole, who first defined an algebraic system of logicCopyright: a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work, including the right to copy
Directories: A typical file system may contain thousands (or even hundreds of thousands) of folders.
Feed: a data format used for providing users with frequently updated content.
Secure Sockets Layer: Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that "provide communications security over the Internet TLS
Set#4
Indexes: a system used to make finding information easier.
Keywords: the words that are used to reveal the internal structure of an author's reasoning.
Libel: defamation by written or printed words, pictures, or in any form other than by spoken words or gestures
Link List: contains a null reference
Math Symbols: a listing of common symbols found within all branches of mathematics
News Feed: a data format used for providing users with frequently updated content.
Peer-to-Peer: computing or networking is a distributed application architecture that partitions tasks or work loads between peers.
Phrase Searching: is used to search for words as phrases.
Plagiarism: is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
Podcatcher: a computer program used to download various media via an RSS or XML feed.
Public Domain: comprises copyright-free works: anyone can use them in any way and for any purpose. Proper attribution to the author
Related Search: software program that searches a database and gathers and reports information that contains or is related to specified terms.
Search Engine: is designed to search for information on the World Wide Web and FTP servers.
Shared bookmark: a method for Internet users to organize, store, manage and search forbookmarks of resources online.
Trademark: a distinctive sign or indicator used by an individual, business organization, or other legal entity
Wiki: a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text
Wildcard character: a special character that represents one or more other characters
Business-to-Business: describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.
Business-to-consumer: describes activities of businesses serving end consumers with products and/or services.
Business-to-government: a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products
Critical Thinking: in its broadest sense has been described as "purposeful reflective judgment concerning what to believe or what to do.
Digital Cash: Electronic money systems
In technical terms, electronic money is an online representation, or a system of debits and credits, used to exchange value within another system, or within itself as a stand alone system.
Electronic Commerce: consists of the buying and selling of products or services overelectronic systems such as the Internet
Keyless Entry System: A remote keyless system can include both a remote keyless entry system (RKE) and a remote keyless ignition system (RKI).
Online Learning: E-learning comprises all forms of electronically supported learning and teaching
Telecommuting: a work arrangement in which employees enjoy flexibility in working location and hours.
Browser Hijacking: It first redirects homepages to its website and begins to collect information on the computer.
Brute force Attacks: a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage
Hacking: The controversy is usually based on the assumption that the term originally meant someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal.
Hardware firewall: Routers assign a unique internal address to each connected unit.
Keylogger: are local software keyloggers programmed with an added feature to transmit recorded data from the target computer to a monitor at a remote location .
Private Key: signatures made with the no longer trusted to be actually private key after time T
Public Key: a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.
Repetitive strain injury: believed by many to be caused due to lifestyle without ergonomic care
Secure Sockets Layer: protocol allows client/server applications to communicate across a network in a way designed to prevent eavesdropping and tampering
Sniffer: capture traffic on all or just parts of the network from a single machine within the network
Spyware: type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.
Strong Password: a measure of the effectiveness of a password in resisting guessing and brute-force attacks.
Transport Layer Security: are cryptographic protocols that provide communications securityover the Internet
IC3 Certification Exam: is to validate fundamental computer skills and knowledge through performance-based testing.
Indexes: a system used to make finding information easier.
Keywords: the words that are used to reveal the internal structure of an author's reasoning.
Libel: defamation by written or printed words, pictures, or in any form other than by spoken words or gestures
Link List: contains a null reference
Math Symbols: a listing of common symbols found within all branches of mathematics
News Feed: a data format used for providing users with frequently updated content.
Peer-to-Peer: computing or networking is a distributed application architecture that partitions tasks or work loads between peers.
Phrase Searching: is used to search for words as phrases.
Plagiarism: is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
Podcatcher: a computer program used to download various media via an RSS or XML feed.
Public Domain: comprises copyright-free works: anyone can use them in any way and for any purpose. Proper attribution to the author
Related Search: software program that searches a database and gathers and reports information that contains or is related to specified terms.
Search Engine: is designed to search for information on the World Wide Web and FTP servers.
Shared bookmark: a method for Internet users to organize, store, manage and search forbookmarks of resources online.
Trademark: a distinctive sign or indicator used by an individual, business organization, or other legal entity
Wiki: a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text
Wildcard character: a special character that represents one or more other characters
Business-to-Business: describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.
Business-to-consumer: describes activities of businesses serving end consumers with products and/or services.
Business-to-government: a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products
Critical Thinking: in its broadest sense has been described as "purposeful reflective judgment concerning what to believe or what to do.
Digital Cash: Electronic money systems
In technical terms, electronic money is an online representation, or a system of debits and credits, used to exchange value within another system, or within itself as a stand alone system.
Electronic Commerce: consists of the buying and selling of products or services overelectronic systems such as the Internet
Keyless Entry System: A remote keyless system can include both a remote keyless entry system (RKE) and a remote keyless ignition system (RKI).
Online Learning: E-learning comprises all forms of electronically supported learning and teaching
Telecommuting: a work arrangement in which employees enjoy flexibility in working location and hours.
Browser Hijacking: It first redirects homepages to its website and begins to collect information on the computer.
Brute force Attacks: a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage
Hacking: The controversy is usually based on the assumption that the term originally meant someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal.
Hardware firewall: Routers assign a unique internal address to each connected unit.
Keylogger: are local software keyloggers programmed with an added feature to transmit recorded data from the target computer to a monitor at a remote location .
Private Key: signatures made with the no longer trusted to be actually private key after time T
Public Key: a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.
Repetitive strain injury: believed by many to be caused due to lifestyle without ergonomic care
Secure Sockets Layer: protocol allows client/server applications to communicate across a network in a way designed to prevent eavesdropping and tampering
Sniffer: capture traffic on all or just parts of the network from a single machine within the network
Spyware: type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.
Strong Password: a measure of the effectiveness of a password in resisting guessing and brute-force attacks.
Transport Layer Security: are cryptographic protocols that provide communications securityover the Internet
IC3 Certification Exam: is to validate fundamental computer skills and knowledge through performance-based testing.