Saturday, February 19, 2011

Worm

computer software capable of reprducing itself and can spread from one computer to the next

Virus

A computer software which has the ability to grow and destroy files

Trojan Horse

a program that seems desirable but contains something harmful

Time Bomb

computer program that has written to stop functioning

teleconferencing

people who are located in different locations which can have a conference thanks to telecommunications equipment

Tagging

to label identification

RDF Summary

an XML specification for documenting metadata

Pyramid Schemes

transfering information through the internet to attempt to extort money or other valuables

Phishing

fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details

Netiquette

social conventions that allow interaction over networks

Logic Bomb

instructions that is giving to a program which is desgined to execute is specific condition is satisfied

hoax

a deliberate trying to decieve or trick people into believing or accepting something

Fraud

an imposter or something intended to decieve

Filtering

a program which a computer can offer to process data stream

Windows Mail

a email and newsgroup provided by windows vista

User Agent

an application implementing a network protocol, which is used for commincation

Text Messaging

exhange of brief messages between mobile phones

Spam

unwanted or junk email

Signature

script associated with a person. It is comparable to a seal, so that it indicates that the person is aware of what is in the document

Packets

a message or message fragments

Mailing List

 a special usage of email that allows for widespread distribution of information to many Internet users

Instant Messaging

a way to communicate with two or more people using shared clients

e-mail Address

a specific email inbox where messages are delieved

Electronic Mail (e-mail)

a way to send a message to someone else through the internet

Distribution List

a list of email adresses used to email everyone at once

Attachment

 a  file which can be send via email

Archiving

to be able to keep important information for a long period of time

Address Book

used to put contacts i n

Saturday, February 12, 2011

Wireless LAN (WLAN)

links devices so it can access the wider internet

Wireless Internet Service Provider(WISP)

providers of internet with networks built around wireless networking

WiMax

a way to communicate by voice or video long distance

Wide area Network (WAN)

 a computer network that covers a broad area

T-1 Line

telephone lines that serve to carry more that what a traditional telephone would do

Server Operating System

specially developed software to serve as a platform for running multiple computer programs

Server

a computer that allows its user to access to files and printers as shared resources to a computer network

Router

a device that allows data packets to be foward between computer networks

Public Switched Telephone Network (PSTN)

a network of public circuit switched telephone networks in the world

Proxy Server

 acts as an intermediary for requests from clients seeking resources from other servers

Peer-Peer Network

an approach to computer networking where all computers share equal responsibility for processing data

Node

a connecting point at which several lines come together

Modem

 a device used to connect computers by a telephone line

Local Area Conector (LAN)

a computer network that connects computers and devices in a limited area such as home, school, computer laboratory or office building

Intranet

a private computer network

Internet

a system of interconnected computer networks that useTCP/IP to serve billions of users around the world

Hub

device that connects many twisted pair or fiber optic Ethernet devices together as one and makes them work as a single netwrok segment

Hacker

 someone who breaks into computer systems in order to steal or change or destroy information

Firewall

security system which tries to avoid exposure of a computer or computer network to attack from crackers

Extranet

a private network that uses Internet protocols

Digital Subscriber Line (DSL)

digital lines that a telephone company allow their subscribers to use to carry data at high speed

Communication Channels

a way in which a message is able to be seen by its intended audience, such as media