| Term 
 | Definition 
 
        | method of verifyijng a person's identity & protect systems from unauthorized access |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | use of biological information such as fingerprint, retina scans, etc for authenticating user |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | computer system or application that acts as an intermediary for requests from clients seeking resources from other servers |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Advanced Encryption Standard = a specification established by the US National Institute of Standards and Technology (NIST) 2001 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | copies of data and files for redundancy in case of need for disaster recovery |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | rules we use to determine right and wrong things to do in our lives. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | an external rule that, if violated, is punishable by society |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 2 or more computers connected to share information |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | communications medium capable of carrying a large amount of data at fast speeds |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | communications medium capable of carrying a small amount of data at slower speeds |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | modulator - demodulator = I/O device used to converts digital to analog for transmitting and converts analog to digital when receiving |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | copper = twisted pair, coaxial; fiber optic cable |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | infrared, laser, require Direct Line of Sight versus radio frequency (WIFI) and Bluetooth and cellular |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | metropolitan area network |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | network housed within an organization to serve internal users. Protected by firewall |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | extension of intranet that allows specified external users including customers, partners to access internal applications and data via the Internet |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | layout or pattern by which a network is organized |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | computers and resources linked in a single line of cable with two endpoints |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | device used to absorb signals to reduce network traffic by minimizing reflections at the end of a network cable.  Review Fault Tolerance concerns. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | aka: hub and spoke topology with one central hub as a switching station between multiple computers. Review Fault Tolerance concerns. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | no hub but there is a "token" which must be empty to carry data from one computer to another in the ring. Review Fault Tolerance concerns. |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | any network connections box |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | basic connection box with no intelligence so 'broadcasting' is a problem causing increased network traffic |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | connecting box withintelligence to inspect data packets as they are received, determining the source and destination device of that packet and forwarding it to the appropriate destination. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | an amplifier that increases the strength of the signal and then sends the amplified signals along the network path. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | concentrator connecting different networks together to carry messages to intended destinations. Routers determine the shortest path your data can travel from computer A to computer B. 
 A router is an application device that has ports, which the computers and servers connect to. Routers are programmed with routing tables to determine the shortest possible path between Computer A and Computer B. A routing table contains a list of IP addresses that a router can connect to transfer data. It is sophisticated enough to determine the number of possible "hops" from one computer to another.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | consisting of hardware and software allowing communications between two similar networks. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | a single point of access to computers outside your network. Connects different kinds of networks together. Exit and Entry points. |  | 
        |  |