Advertisement Upgrade to remove ads

Technology in Action Chapter 7, 12 and 13

Anitivirus software

Software that is specifically designed to detect virsuses and protect a computer and files from harm.

Distributed Deniral of Service

An automated attack that is launched that is launched from more than one zombnie computer at the the same time.

Firewall

Software program or hardare device designed to precent unauthorized access to computers or networks.

Hacker

anyone who unlawfully breaks into a computer systems

Idenity Theft

process by which someone uses personal information about someone else.

Information Assurance

set of meausers intended to protect and defend information by ensuring their availability, integrity, authentication, confiendtaility, and nonrepudiation.

Logical Port

virtual commmunications gateway or path that enables a computer to organize requests for information.

Network Adapter

Device that enables the computer to communciate with the network using protcol.

P2P

Peer 2 Peer network

Packet Sniffer

Program that looks at each data packet as it travels on the internet

Repeater

Device that is installed on a long cable run to amplify a signal.

Router

Device that routes packets of data between two or more networks

Swtich

Device for transmitting data on a network

Throughput

The acutual speed of data transfrer that is achieved

Virus

Computer program that attches itself to another computer program.

Wireless Network

A network that uses radio waves instead of wires or cable as its transmission medium.

WML

Wireless Markup Language

Zombie

Computer that is controlled by a hacker who uses it to launch attacks on other computer systems.

White-Hat Hacker

A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.

Trojon Horse

Computer Program that apprears to be something useful but at the same time does something malicios in the background.

Time Bomb

Virus that is triggered by the passage of time or on a certain date.

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

Black-hat hacker

A hacker who uses his knowledge to destroy information or for illegal gain.

Dynamic Addressing

The process of assigning Internet Protocol (IP) addresses when users log on using their Internet service provider (ISP). The computer is assigned an address from an available pool of IP addresses.

NOS

network operating system

Transceiver

In a wireless network, a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes.

Cat 6 Cable

A UTP cable type that provides more than 1 GB of throughput

Client/Server Network

A network, consisting of client and server computers, in which the clients make requests of the server and the server returns the response.

Data transfer rate

the maximum speed at which data can be transmitted between two nodes on a network

Hub

Simple amplications device that receives data packets and retransmits them to all nodes on the same network.

LAN

Local Area Network

Piggybacking

the process of connecting to a wireless network without the permission of the owner of the network

Coaxial Cable

A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.

Network-ready device

A device (such as a printer or external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network.

Wireless

Network based on the 802.11 standard

WAN

Wide area network

application server

a server that acts as a repository for application software

Bastion host

A heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.

Bridge

Netwrok decice that is used to send data between two different local area networks (LANS)

Bus

Groups of electrical pathways that provide communications between various parts of a computer.

Database server

A server that provides client computers with access to information stored in a database.

FiOS

Fiber Optic Service

LAN

Local Area Network

Network Administrator

Someone who has training in computer and peripheral maintenance and repair, network design, and the installation of network software; installs new equipment, configures computers for users, repairs equipment, and assigns network access to users.

Packet screening

A process that involves examining incoming data packets to ensure they originated from, or are authorized by, valid users on the internal network.

Packets

small pieces of information passed between computers

Scalable Network

a type of network that enables the easy addition of users without affecting the performance of the other network nodes (computers or peripherals)

Star topology

The oldest type of network design, this topology consists of multiple nodes attached to a central hub, switch, or router.

Twisted Pair Cable

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).

Wireless Access Point

device that will send and recieve wireless signal - connected by cable and positioned (similar to a switch in a Ethernet network) Take the place of a wireless netork adapter

Token ring topology

a network topology configured in a logical ring that complements the token passing protocol

WAP

Wireless Access Point

VPN

Virtual Private Network

Extranet

A collaborative network that uses Internet technology to link businesses with their suppliers, customers, or other businesses.

Internet

a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

Protocol

the rules that must be observed for two electronic devices to communicate with each other

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set