Term
|
Definition
| A device that reads information from a magnetic strip on the back of a credit card-like access card. |
|
|
Term
|
Definition
| A method to control which computer is allowed to use transmission media at a certain time. |
|
|
Term
|
Definition
| In a network, a type of topology where the nodes participate in moving data through the network. |
|
|
Term
|
Definition
| A server that acts as a repository for application software. |
|
|
Term
|
Definition
| The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network. |
|
|
Term
|
Definition
| A server that keeps track of who's logging on to the network and which services on the network are available to each user. |
|
|
Term
|
Definition
| A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall. |
|
|
Term
| Biometric Authentication Device |
|
Definition
| A device that uses some unique characteristic of human biology to identify authorized users. |
|
|
Term
|
Definition
| A device that's used to send data between different collision domains in a network, depending on where the recipient device is located. |
|
|
Term
|
Definition
| An attempt to access an account by repeatedly trying different passwords. |
|
|
Term
| Bus (Linear Bus) Topology |
|
Definition
| A system of networking connections in which all devices are connected in sequence on a single cable. |
|
|
Term
|
Definition
| A characteristic of client/server networks where the server, not the individual user, coordinates data security. |
|
|
Term
| Client/Server Network (Server-based Network) |
|
Definition
| A type of network that uses servers to deliver services to computers that are requesting them (clients). |
|
|
Term
|
Definition
| A server that is maintained by a hosting company and that is connected to networks via the Internet. |
|
|
Term
|
Definition
| A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service. |
|
|
Term
|
Definition
| A server that handles all communications between the network and other networks, including managing Internet connectivity. |
|
|
Term
|
Definition
| The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. An node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals. |
|
|
Term
|
Definition
| When two computers send data at the same time and sets of data collide somewhere in the connection media. |
|
|
Term
|
Definition
| A server that provides client computers with access to information stored in databases. |
|
|
Term
|
Definition
| A characteristic of peer-to-peer networks where the individual user coordinates data security. |
|
|
Term
|
Definition
| A server used to fulfill one specific function, such as handling e-mail. |
|
|
Term
|
Definition
| Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed. |
|
|
Term
| Electronic Data Interchange (EDI) |
|
Definition
| The exchange of large amounts of data in a standardized electronic format. |
|
|
Term
|
Definition
| A server whose sole function is to process and deliver incoming and outgoing e-mail. |
|
|
Term
|
Definition
| An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it. |
|
|
Term
|
Definition
| A cable that transmits data at close to the speed of light along glass or plastic fibers. |
|
|
Term
|
Definition
| A server that stores or manages files for network users or that acts as a storehouse for files that users can download. |
|
|
Term
|
Definition
| Groups of data packets that are sent together in a package. |
|
|
Term
|
Definition
| A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or system that contains something of great value. |
|
|
Term
|
Definition
| Combining multiple topologies into one network. |
|
|
Term
|
Definition
| Ensuring that information systems contain accurate information and are adequately secured against tampering. |
|
|
Term
|
Definition
| A private network set up by a business or organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters. |
|
|
Term
|
Definition
| A special signal sent to network nodes alerting them that a data collision has occurred. |
|
|
Term
|
Definition
| A network in which the nodes are located within a small geographic area. |
|
|
Term
| Media Access Control (MAC) Address |
|
Definition
| The physical address, similar to a serial number, of each network adapter. |
|
|
Term
|
Definition
| A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol. |
|
|
Term
|
Definition
| Person who maintains networks for businesses. |
|
|
Term
| Network Operating System (NOS) |
|
Definition
| Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate. |
|
|
Term
|
Definition
| The physical or logical arrangement of computers, transmission media (cable), and other network components. |
|
|
Term
| Open Systems Interconnection (OSI) |
|
Definition
| A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks. |
|
|
Term
|
Definition
| Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network. |
|
|
Term
|
Definition
| In a network, a type of topology where the nodes do nothing to move data along the network. |
|
|
Term
|
Definition
| Any object that users carry to identify themselves and that grants them access to a computer system or facility. |
|
|
Term
|
Definition
| A software holding area for print jobs. Also called a print spooler. |
|
|
Term
|
Definition
| A server that manages all client-requested printing jobs for all printers on a network. |
|
|
Term
|
Definition
| A set of rules for exchanging communications. |
|
|
Term
|
Definition
| A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet). |
|
|
Term
|
Definition
| A type of network topology where computers and peripherals are laid out in a configuration resembling a circle. |
|
|
Term
|
Definition
| A device that routes packets of data between two or more networks. |
|
|
Term
|
Definition
| A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes. |
|
|
Term
| Shielded Twister-Pair (STP) Cable |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Virtual Private Network (VPN) |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Wireless Access Point (WAP) |
|
Definition
|
|
Term
| Wireless Network Interface Card (Wireless NIC) |
|
Definition
|
|