biometric security measure
...
cable modem
uses existing cable television lines to send and receive data
client
a software program such as Internet Explorer; accesses the shared resources, services, and programs provided by the server
client/server network
describes a network design model; in this type architecture, one or more computers on the network act as a server; the server manages network resources, such as a mail server, a database server, a Web server and so on. The computer providing the service i
communications channels
...
digital subscriber line (DSL)
modem uses an Internet connection technology that provides for the transfer of information to a computer at a high-speed band-width over ordinary copper telephone lines
extranet
this type of network allows specific users outside of the organization access to internal information systems in an intranet
firewall
...
hacker
people who break into computer systems to steal services and information
hub
a device that controls the incoming and forwarding of data
Internet
a worldwide system composed of thousands of smaller networks
intranet
this type of network is designed for the exclusive use within an organization. Many businesses have implemented intranets so that employees can access documents such as handbooks, employee manuals, newsletters, employment forms, and other relevant company
local area network (LAN)
connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, school, or home
modem
a type of communications device
node
...
peer-to-peer (P2P) network
in this network design, all of the computers are equal and no computer is designated as the server. all computers can act as a client and a server. users on the network each determine what files on their computer they share with others on the network
proxy server
...
Public Switched Telephone Network (PSTN)
international collection of collected voice-based public telephone networks
router
directs traffic on the Internet or on multiple connected networks
server
hardware (a computer) and can be one of many types, such as a mail server, a database server, an FTP server, an application server or a Web server
server operating system
high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
T-1 line
a type of fiber-optic telephone line that can transmit voice and data at the same time
wide area network (WAN)
covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries
WiMAX
Worldwide Interoperability for Microwave Access is a wireless technology that can deliver maximum speeds to your cell phone, home computer, home computer or car; an alternative to cable and DSL, especially for users in area that cable and DSL service prov
wireless internet service provider
...
wireless LAN (WLAN)
a variation of the LAN without physical wires to connect devices; to communicate on a WLAN, the computer and other devices that access the network must each have a wireless devices or built-in wireless capability, WLAs connect devices that are very close
network
simply a group of two or more computers linked together
Address Book
stores names, e-mail addresses, phone numbers, and other contact information so you can easily access it while you are sending and receiving e-mail messages
archiving
the process of backing up e-mail messages
attachment
documents, images, figures, and other files that you can attach to your email messages
Contact Group
...
e-mail address
consists of three parts: the user name, the @ symbol, the user's domain name
electronic mail (e-mail)
can be sent to other people on a network at an organization or you can use an Internet service provider to send e-mail to any computer in the world
instant messaging
send messages in real time
packet
when you send someone an email message, it is broken down into small chunks that travel independently from server to server to speed the process
save a message
as a draft, a file in another format such as a text file, an HTML document, or a template using the Save As dialog box
signature
consists of text or pictures that you create so Outlook can add it to the end of any outgoing messages
spam
unsolicited e-mail, essentially electronic junk mail; consists of unsolicited messages that take up space in your Inbox unnecessarily
text messaging
using a cell phone or other mobile device to send and receive written message
user agent
a software application such as email, text message, or an instant messaging program
Windows Live Mail
an email program provided free of charge from the Windows Live Web site
filtering
...
fraud
a computer crime that involves the manipulation of a computer or computer data to dishonestly obtain money, property, information, or other things of value, or to cause loss
hoax
an attempt to deceive an audience into believing that something false is real
logic bomb
triggered by the appearance or disappearance of specified data
netiquette
refers to good manners when communicating through electronic media
phishing
messages are personal information scams
pyramid scheme
an illicit business model where profits are based on the investor's ability to recruit other people who are enrolled to make payments to their recruiters
RDF Summary
formats widely used to share the contents of blogs
spam
...
tagging
keyword descriptions to identify images or text, to simplify the search process
teleconferencing
uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people
time bomb
does not cause its damage until a certain date or until the system has been launched a certain number or times
Trojan horse
a virus that does something different from what is expected to do
urban legend
stories that at one time could have been partially true but have grown from constant retelling into a mythical yarn
virus
a program written to corrupt data on a computer
worm
makes many copies of itself, consuming system resources so that the computer slows down or actually halts tasks