Saturday, February 19, 2011
teleconferencing
people who are located in different locations which can have a conference thanks to telecommunications equipment
Phishing
fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details
Logic Bomb
instructions that is giving to a program which is desgined to execute is specific condition is satisfied
Signature
script associated with a person. It is comparable to a seal, so that it indicates that the person is aware of what is in the document
Mailing List
a special usage of email that allows for widespread distribution of information to many Internet users
Saturday, February 12, 2011
Server
a computer that allows its user to access to files and printers as shared resources to a computer network
Peer-Peer Network
an approach to computer networking where all computers share equal responsibility for processing data
Local Area Conector (LAN)
a computer network that connects computers and devices in a limited area such as home, school, computer laboratory or office building
Internet
a system of interconnected computer networks that useTCP/IP to serve billions of users around the world
Hub
device that connects many twisted pair or fiber optic Ethernet devices together as one and makes them work as a single netwrok segment
Firewall
security system which tries to avoid exposure of a computer or computer network to attack from crackers
Subscribe to:
Posts (Atom)