Friday, December 10, 2010

Marking Period 3 Vocabulary Words set #1



1) Biometric Security Measures:Biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.


2) Cable Modem: A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN) and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service.


3) Client:A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web.


4) Client/ Server Network:A client is the requesting program or user in a client/server relationship. For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web.
5) Communication Channels: communication channels flow within the chain of command or task responsibility defined by the organisation.


6) Digital Subscriber Line (DSL):Digital Subscriber Line (DSL) technology is a modem technology that uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers.
7) Extranet:An extension of an institution's intranet, especially over the WorldWide Web, enabling communication between the institution and people it deals with, often by providing limited access to its intranet. 8) Firewall:Any of a number of security schemes that prevent unauthorized users from gaining access to a computer network or that monitor transfers of information to and from the network.
9) Hacker:A person who writes programs in assembly language or in system-level languages, such as C. The term often refers to any programmer, but its true meaning is someone with a strong technical background who is "hacking away" at the bits and bytes.
10) Hub:An Ethernet hub, active hub, network hub, repeater hub or hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model
11) Internet:The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.
12) Intranet:A privately maintained computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.
13) Local Area Conector (LAN):Local Area Networks (LANs) are the small networks to which many business and home-computer user initially connect.
14) Modem:A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information.
15) Node: In communication networks, a node is a connection point, either a redistribution point or acommunication endpoint (some terminal equipment). The definition of a node depends on the network andprotocol layer referred to. 
16) Peer-Peer Network:Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.
17) Proxy Server:In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. 
18) Public Switched Telephone Network (PSTN):The public switched telephone network (PSTN) also referred to as the plain old telephone service (POTS) is the network of the world's public circuit-switched telephone networks.
19) Router:A router is an electronic device that intercepts signals on a computer network. The router determines where the signals have to go.
20) Server:In computer networking, a server is a program that operates as a socket listener. The term server is also often generalized to describe a host that is deployed to execute one or more such programs
21) Server Operating System:Server-oriented operating systems tend to have certain features in common that make them more suitable for the server environment
22) T-1 Line:In telecommunications, T-carrier, sometimes abbreviated as T-CXR, is the generic designator for any of several digitally multiplexed telecommunications carrier systemsoriginally developed by Bell Labs and used in North AmericaJapan, and South Korea.
23) Wide area Network (WAN):A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries )
24) WiMax:WiMAX (Worldwide Interoperability for Microwave Access) is atelecommunications protocol that provides fixed and fully mobile Internet access. The current WiMAX revision provides up to 40 Mbit/s
25) Wireless Internet Service Provider(WISP):Wireless Internet Service Providers (WISPs) are Internet service providers with networks built around wireless networking
26) Wireless LAN (WLAN):A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. 

Set#2




Address Book: An address book or a name and address book (NAB) is a book or a database used for storing entries called contacts.

Archiving: Archives; List of archives; Manuscript processing; Preservation (library andarchival science)

Attachment: Attachment theory is a psychological, evolutionary, and ethological theory concerning relationships between humans.

Distribution list: is a term sometimes used for a function of email clients where lists of email addresses are used to email everyone on the list at once.

Electronic Mail: Electronic mail, commonly called email or e-mail, is a method of exchanging digital messages across the Internet or other computer networks

e-mail address: An email address identifies an email mailbox to which email messages may be delivered. An example format of an email address is lewis@example.net

Instant Messaging: Instant messaging (IM) is a form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared software

Mailing List: A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.

Packets: a packet is a formatted unit of data carried by a packet mode computer network.

Signature: is a handwritten (and sometimes stylized) depiction of someone's name, nickname or even a simple "X" that a person writes on.

                                                                        
                     Set#3


ActiveX: a framework for defining reusable software components in a programming language independent way.

Client: is an application or system that accesses a remote service on another computer system, known as a server, by way of a network The term was first applied to devices

Cookie: a web 
cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user 's web browser

Digital Certificate: a public key 
certificate (also known as a digital certificate or identitycertificate) is an electronic document which uses a digital signature to bind a public key

Domain: an identification label that defines a realm of administrative autonomy, authority, or control in the Internet.

File Transfer Protocol: is a standard network 
protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet.

Geographic Imaging: division of the National 
Geographic Society (NGS) headquartered in Washington, D.C., USA, is a stock photography agency

Hit: a strike (attack), the act of 
hitting someone or something to cause physical harm.

Home Page: has various related meanings to do with web sites: It most often refers to the initial or main web 
page of a web site, sometimes called the front page

Hypertext markup Language: is the predominant markup language for web pages.

Hypertext Transfer Protocol: a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication

Internet Protocol Address: a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

Internet Service Provider: a company that offers its customers access to the Internet

Mosaic: the art of creating images with an assemblage of small pieces of colored glass, stone, or other materials

Podcast: a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication.

Portal: a general term describing an opening in the walls of a building, gate or fortification, and especially a grand entrance to an important structure

Really Simple Syndication: a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio

Social Networking Site: an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people

Uniform Resource Locator: a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.

Web 2.0: commonly associated with web applications that facilitate interactive systemic biases, interoperability, user-centered design and developing the World Wide Web.

Web Cache: the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing

Website: a collection of related web pages, images, videos or other digital assets that are addressed

Webapp: In earlier types of cloud computing, each application had its own client program which served as its user interface and had to be separately installed on each user

Wiki: is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text

Blog: (a blend of the term web log is a type of website or part of a website. 
Blogs are usually maintained by an individual with regular entries of commentary

Boolean Logic: a complete system for 
logical operations, used in many systems. It was named after George Boole, who first defined an algebraic system of logicCopyright: a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work, including the right to copy

Directories:
 A typical file system may contain thousands (or even hundreds of thousands) of folders.

Feed: a data format used for providing users with frequently updated content.

Secure Sockets Layer: Transport 
Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that "provide communications security over the Internet TLS
  
                                                       Set#4
Indexes: a system used to make finding information easier.

Keywords: the words that are used to reveal the internal structure of an author's reasoning.

Libel: defamation by written or printed words, pictures, or in any form other than by spoken words or gestures

Link List: contains a null reference

Math Symbols: a listing of common symbols found within all branches of mathematics

News Feed: a data format used for providing users with frequently updated content.

Peer-to-Peer: computing or networking is a distributed application architecture that partitions tasks or work loads between peers.

Phrase Searching: is used to search for words as phrases.

Plagiarism: is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language

Podcatcher: a computer program used to download various media via an RSS or XML feed.



Public Domain: comprises copyright-free works: anyone can use them in any way and for any purpose. Proper attribution to the author

Related Search: software program that searches a database and gathers and reports information that contains or is related to specified terms.

Search Engine: is designed to search for information on the World Wide Web and FTP servers.

Shared bookmark: a method for Internet users to organize, store, manage and search forbookmarks of resources online.

Trademark: a distinctive sign or indicator used by an individual, business organization, or other legal entity

Wiki: a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text

Wildcard character: a special character that represents one or more other characters

Business-to-Business: 
describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

Business-to-consumer: describes activities of businesses serving end consumers with products and/or services.

Business-to-government: a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products

Critical Thinking: in its broadest sense has been described as "purposeful reflective judgment concerning what to believe or what to do.

Digital Cash: Electronic money systems
In technical terms, electronic money is an online representation, or a system of debits and credits, used to exchange value within another system, or within itself as a stand alone system.

Electronic Commerce: consists of the buying and selling of products or services overelectronic systems such as the Internet

Keyless Entry System: A remote keyless system can include both a remote keyless entry system (RKE) and a remote keyless ignition system (RKI).

Online Learning: E-learning comprises all forms of electronically supported learning and teaching

Telecommuting: a work arrangement in which employees enjoy flexibility in working location and hours.

Browser Hijacking: It first redirects homepages to its website and begins to collect information on the computer.

Brute force Attacks: a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage

Hacking: The controversy is usually based on the assumption that the term originally meant someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal.

Hardware firewall: Routers assign a unique internal address to each connected unit.



Keylogger: are local software keyloggers programmed with an added feature to transmit recorded data from the target computer to a monitor at a remote location .


Private Key: signatures made with the no longer trusted to be actually private key after time T

Public Key: a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.

Repetitive strain injury: believed by many to be caused due to lifestyle without ergonomic care

Secure Sockets Layer: protocol allows client/server applications to communicate across a network in a way designed to prevent eavesdropping and tampering

Sniffer: capture traffic on all or just parts of the network from a single machine within the network

Spyware: type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.

Strong Password: a measure of the effectiveness of a password in resisting guessing and brute-force attacks.

Transport Layer Security: are cryptographic protocols that provide communications securityover the Internet

IC3 Certification Exam: is to validate fundamental computer skills and knowledge through performance-based testing.

No comments:

Post a Comment