IC3 Quiz 8

biometric security measure

...

cable modem

uses existing cable television lines to send and receive data

client

a software program such as Internet Explorer; accesses the shared resources, services, and programs provided by the server

client/server network

describes a network design model; in this type architecture, one or more computers on the network act as a server; the server manages network resources, such as a mail server, a database server, a Web server and so on. The computer providing the service i

communications channels

...

digital subscriber line (DSL)

modem uses an Internet connection technology that provides for the transfer of information to a computer at a high-speed band-width over ordinary copper telephone lines

extranet

this type of network allows specific users outside of the organization access to internal information systems in an intranet

firewall

...

hacker

people who break into computer systems to steal services and information

hub

a device that controls the incoming and forwarding of data

Internet

a worldwide system composed of thousands of smaller networks

intranet

this type of network is designed for the exclusive use within an organization. Many businesses have implemented intranets so that employees can access documents such as handbooks, employee manuals, newsletters, employment forms, and other relevant company

local area network (LAN)

connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, school, or home

modem

a type of communications device

node

...

peer-to-peer (P2P) network

in this network design, all of the computers are equal and no computer is designated as the server. all computers can act as a client and a server. users on the network each determine what files on their computer they share with others on the network

proxy server

...

Public Switched Telephone Network (PSTN)

international collection of collected voice-based public telephone networks

router

directs traffic on the Internet or on multiple connected networks

server

hardware (a computer) and can be one of many types, such as a mail server, a database server, an FTP server, an application server or a Web server

server operating system

high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network

T-1 line

a type of fiber-optic telephone line that can transmit voice and data at the same time

wide area network (WAN)

covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries

WiMAX

Worldwide Interoperability for Microwave Access is a wireless technology that can deliver maximum speeds to your cell phone, home computer, home computer or car; an alternative to cable and DSL, especially for users in area that cable and DSL service prov

wireless internet service provider

...

wireless LAN (WLAN)

a variation of the LAN without physical wires to connect devices; to communicate on a WLAN, the computer and other devices that access the network must each have a wireless devices or built-in wireless capability, WLAs connect devices that are very close

network

simply a group of two or more computers linked together

Address Book

stores names, e-mail addresses, phone numbers, and other contact information so you can easily access it while you are sending and receiving e-mail messages

archiving

the process of backing up e-mail messages

attachment

documents, images, figures, and other files that you can attach to your email messages

Contact Group

...

e-mail address

consists of three parts: the user name, the @ symbol, the user's domain name

electronic mail (e-mail)

can be sent to other people on a network at an organization or you can use an Internet service provider to send e-mail to any computer in the world

instant messaging

send messages in real time

packet

when you send someone an email message, it is broken down into small chunks that travel independently from server to server to speed the process

save a message

as a draft, a file in another format such as a text file, an HTML document, or a template using the Save As dialog box

signature

consists of text or pictures that you create so Outlook can add it to the end of any outgoing messages

spam

unsolicited e-mail, essentially electronic junk mail; consists of unsolicited messages that take up space in your Inbox unnecessarily

text messaging

using a cell phone or other mobile device to send and receive written message

user agent

a software application such as email, text message, or an instant messaging program

Windows Live Mail

an email program provided free of charge from the Windows Live Web site

filtering

...

fraud

a computer crime that involves the manipulation of a computer or computer data to dishonestly obtain money, property, information, or other things of value, or to cause loss

hoax

an attempt to deceive an audience into believing that something false is real

logic bomb

triggered by the appearance or disappearance of specified data

netiquette

refers to good manners when communicating through electronic media

phishing

messages are personal information scams

pyramid scheme

an illicit business model where profits are based on the investor's ability to recruit other people who are enrolled to make payments to their recruiters

RDF Summary

formats widely used to share the contents of blogs

spam

...

tagging

keyword descriptions to identify images or text, to simplify the search process

teleconferencing

uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people

time bomb

does not cause its damage until a certain date or until the system has been launched a certain number or times

Trojan horse

a virus that does something different from what is expected to do

urban legend

stories that at one time could have been partially true but have grown from constant retelling into a mythical yarn

virus

a program written to corrupt data on a computer

worm

makes many copies of itself, consuming system resources so that the computer slows down or actually halts tasks