Thursday, January 20, 2011

Vocabulary Words 3rd Marking Period

 Word Set #1

1.Biometric Security Measures-
2.Cable Modem-Is A device that uses a cable TV signal to connect a computer to the Internet. 
3.Client- is an application or system that accesses a remote service on another computer system, known as a server, by way of a network
4.Client/ServerNetwork- is a distributed application architecture that partitions tasks or work loads between service providers and service requesters
5.Communication Channel-the used to convey information from a sender  to a receiver
6.DSL-Is a family of technologies that provides digital data transmission over the wires of a local telephone network
7.Extranet-is a private network that uses Internet protocols, network connectivity
8.Fire Wall-that functions in a networked environment to prevent some forbidden communications / viruses
9.Hacker-Is A Person who breaks into computers.
10.Hub-is a UK based, online, speculative fiction magazine.
11.Internet-Is when you get internet in your computer like wifi.
12.Intranet-a private network created using World Wide Web software
13LAN-is a computer network covering a small physical area, like a home, office, or small group of buildings
14.Modem-is a device that modulates an analog carrier signal to encode digital information,
15.Node-Is a connecting point at which several lines come together
16.Peer-Peer Network-Is A Network That Is Peer to each One.
17.Proxy Server- is a server  that acts as an intermediary for requests from clients seeking resources from other servers
18.PSTN- telephone system in which phone calls are switched or routed from origin to destination
19.Router-a device that forwards data packets between computer networks
20.Server-a server is any combination of hardware or software designed to provide services to clients
21.Server Operating System-Is The Operating System that provides to clients.
22.T-1 Line-A special type of telephone line for digital communication and transmission
24.Wimax-a telecommunications technology providing wireless data, voice and video over long distances
25.WISP-a company set-up to provide access to the internet using wireless technology
26.WLAN-A wireless local area network (WLAN) links devices via a wireless distribution method

  Word Set #2
1.Address Book- is an address book for Apple's Mac OS X.
2.Archiving-to file or collect
3.Attachment-is when you attach something into messages.
4.Distribution List-is a term sometimes used for a function of email clients where lists of email addresses are used to email everyone on the list at once
5.E-Mail-Is When you get a message from someone.
6.E-Mail Address-means your account that you have like aim,gmail,and windows.
7.Instant Messaging-Is when it has aim,windows,abd yahoo.
8. Mailinglist-A set of e-mail addresses designated for receiving specific e-mail messages.
9.Packets-A piece of a message transmitted over a packet-switching network
10.Signature-your name written in your own handwriting
11.Spam-is the abuse of electronic messaging systems  to send unsolicited bulk messages indiscriminately
12.Text Messaging-When you text someone through your phone 
13.UserAgent- is a client application implementing a network protocol used in communications within a client-server distributed computing system
14.Windows Mail- is an e-mail and newsgroup client included in Windows Vista, that was superseded by Windows Live Mail
15.Filtering-is a computer program to process a data stream
16.Fraud-any act of deception carried out for the purpose of unfair, undeserved and/or unlawful gain
17.Hoax-a form of chain letter, carrying a false warning of a internet security threat that doesn't exist.
18.Logic Bomb- is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
19.Netiquette-Operating within an online environment requires adherence to a set of protocols and rules of conduct
20.Phising-The act of sending email that falsely claims to be from a legitimate organization.
21.Pyramid Schemes- via the Internet in an attempt to extort money or other valuables or the use of pyramid/chain letters are all illegal and all are prohibited
22.RDF Summary-Is A Summary Of A letter Sent 
23.Spam-When you want to delete something 
24.Tagging-is when you tag something to people or tag photos.-
25.teleconferencing-When you have a conference through your phone 
26.Time Bomb-the time that they use for the bomb 
27.Trojan Horse-secretly carries often-damaging software in the guise of an innocuous program
28.Urban Legend-a story that appears mysteriously and spreads spontaneously in various forms and is usually false
29.Virus-When your computer is get virus and it stops working.
30.Worm-Is A Thin Cable Looking like a worm.

No comments:

Post a Comment