Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
Nursing Informatics Chapter 4
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (64)
Internet
A world wide network of computer that traces its origins to 1969. It enables email and provides access to the WWW.
Network
A connection of computer hardware and software that allows communication between computers.
Local area network (LAN)
A computer network that includes computers in a relatively small area such as a department or a single building. LANs can be connected to form a WAN (wide area network).
Wide area network (WAN)
A computer network that encompasses a wide geographic area.
Peer-to-peer network
A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.
Client-server architecture
A type of network connection in which PCs are workstations called clients have software that allows them to communicate with another computer, known as a the server, which can process and respond to the requests of clients.
Hard wired
Connecting a computer to a network with a wire (cable). Opposed to wireless in which the connection is by radio waves.
Wireless
A use of any electrical device that connects through radio frequency and is not physically connected to any other device.
Nodes
1.) A computer that is connected to a network. 2.) A piece of hardware that sends wireless signals. Often used to repeat signals so the wireless network can be accessed in different areas.
Wire equivalent privacy (WEP)
A standard method of encrypting wireless transmissions and providing secure Internet connections.
Broadband
The name given to a transmission wire that can carry several channels of information at the same time. Internet connections with Cable TV and DSL are examples. Provides for a faster connection to the Internet.
Digital subscriber line (DSL)
A telephone line that uses sophisticated schemes to pack data so that it can be sent in digital format over existing phone lines in a way that it shares the same line with regular voice. Usability is limited by the distance a user is from the telephone switching station.
Modem
A device that allows a computer to send data over telephone lines. It is an acronym for Modem-Demodulator. It converts a computer's digital signal to the analog signal used by telephone lines.
Internet protocol (IP)
One of the two Internet protocols, the IP is responsible for locating the computer in either an email address or Web address (known as a URL) and directing the message or in the case of the WWW, the request for a file, to the correct location.
Transmission Control Protocol (TCP)
One of two agreed upon protocol used on the Internet that enables two host computer to establish a connection and exchange data.
File Transfer Protocol (FTP)
A method of placing (uploading) files on the Internet of Web and retrieving (downloading) them. Web browsers handle the downloading seamlessly so users are unaware that this protocol is being used.
Browser
Short for Web browser, software that locates, downloads and displays Web pages. Two popular browsers are Microsoft Internet Explorer and Mozilla Firefox.
World Wide Web (WWW or W3)
A part of the Internet that consists of interlinked documents that are accessed and viewed using a Web browser. WWW document can contain text, images, videos, and other multimedia. Navigation between documents is by clicking on hyperlinks, or areas that access another Web page.
Plain Old Telephone Service (POTS)
An Internet connection that is used by dialing the number of the Internet Service Provider. POTS lines are restricted to a transfer rate of 56.6 kilobits per second to the computer (about 700 characters per second). May be referred to as dial-up. Many metropolitan areas are being replaced by broadband connections.
Bandwidth
A measure of the speed at which a line (wire) transmits data. The rates depend on the type of connection such as POTS, DSL, or cable.
Fiber optic cable
A wire as thin as copper wire which contains very thing, pure glass fivers. Because the fibers are so small more fibers can be bundled in a size equivalent to a copper wire. It is the fastest method of sending data with speed currently reaching 1000 megabits per second.
Download
Moving computer data from one computer to another. This term usually refers to moving data from a server to a smaller computer.
Upload
Transmit information from a smaller computer to a larger one. This process is often associated with placing files on an Internet server from a PC, but it can also refer to copying information from a PDA type computer to a PC.
Megabits per second
Measurement of the speed of the transfer of data. Is equal to 125,000 bytes. Abbreviated Mbit or Mb.
Telephony
Computer software and hardware that can preform functions usually associated with a telephone.
IP address
Although the usual way that a computer on the Internet is addressed is through a name, each of these names is backed up by a number assigned to the computer. The address is four numbers from one to 225 separated by a period. IP addresses can be dynamic or static.
Domain Name System (DNS)
A system under which each computer on the Internet has a registered number and name. The alphabetic names are generally used when sending messages or requesting a WWW file because they are easy to remember. The DNS translates these alphabetic names into the numbers that match the character name. These are Internet Protocol (IP) addresses. For example, the domain name www.example.com might translate to 198.105.232.4
Static IP address
An IP address that remains the same every time a computer is connected to the Internet.
Dynamic IP address
An IP address that changes. Having dynamic IP address makes it more difficult for intruders to invade a computer.
Net neutrality
The principle that all Internet users should be treated equally in terms of downloading information whether it is a small file, or a large one. This principle has been in effect since the start of the Internet and has led to its phenomenal growth. To alleviate the traffic jams that are developing on the Internet, broadband carriers want to determine which content is delivered the fastest thus altering the principle.
Markup language
A computer language that surrounds text with beginning and ending tags, typically set off in angle brackets. HTML and XML are examples.
XML
An acronym for extensible mark-up language that allows for the creation and formatting of documents in a way that specifies their contents. XML is finding a user in health care as a way to include parts of fee text in a database.
Graphical User Interface (GUI)
A way of interacting with the computer in which the user makes selections from images called icons
Universal Resource Locator (URL)
1) The address one puts in the locator bar of a Web browser; 2) The name given to addresses uesd for documents on the WWW. They generally start with "http://" or "www" or some variation such as "https://"
Case sensitive
A condition in which the compute evaluates not only the characters entered, but also whether a letter is upper or lower case. Passwords are usually case sensitive, as can be the addresses of websites after the first single foreward slash (\)
Home page
(1) The document displayed when the computer named in the URL is accessed (the name of the computer is the letters between either the double forward slash or the www. and the first single forward slash)
Active Server Page (ASP)
A type of Web page that is created dynamically on the fly. It pulls data from various places to create a timely page. These Web pages end in the extension .asp. An add-on for Web pages that allows for the creation of interactive pages that can show data in real time.
Java
A programming language that allows any program written in this language to be used with any operating system.
Java script
A scripting language that is interpreted in the run-time that runs in Web browsers. It easily interacts with HTML elements.
Active X
Small program delivered by Internet Explorer that can run in Windows or Mac operating system. They can be good or harmful.
Rich Internet Application (RIA)
A web application that has the features and functions of desktop software.
Favorite
The term used y Microsoft Internet Explorer to designate a list of folders that the user wishes easy access to. Analogous to Bookmark used by other browsers.
Bookmark
The name some browsers (Firefox and Netscape) give to a collection of Web addresses that the user has added to a list to make accessing it easy. Analogous to Favorites in IE.
Cookie/web cookies
A WWW phenomenon in which a visited site send a piece of data to the users computer and reads it the next time the use visits the site
Spyware
Software that is downloaded surreptitiously to a user's computer and records keystrokes for transmission to a third party.
Adware
Software that is combined with another program and presents advertisements to the user of the program. Is sometimes distributed with free versions of downloadable software.
Plug-in
A computer program that interacts with another program, usually a Web browser to allow content to be seen. Examples are Adobe Acrobat Reader and Adobe Flash Player. These programs are usually freely available for download from the web.
Streaming
A technique for delivering data used with audio and video in which the recipient is able to hear or see part of the file before the entire file is delivered.
Intranet
Networks which are accessed using a web browser, but are only available to users within a specific organization.
Extranet
An extension of an intranet which provides accessibility to an agency intranet to a specific group of outsides.
Virtual Private Network (VPN)
A private network that is built form a public network by creating "tunneling" links in the network and often using encryption.
Computer malware
Software that does malicious things. Includes viruses, worms, Trojan horses, spyware, and some adware.
Botnet
Newest, fastest-growing malware threat. Botnets are networks of computers that have been hijacked by a malware virus or worm.
Worm
A program that replicates itself without the use of a host file although some modern computer worms also use fuels to hide inside.
Denial of service attack
A condition in which an attacker prevents legitimate users from accessing information or services such as email or a company web site. The most common type occurs when an attacks floods a network with information, often with spam.
Phishing
A trick used to entice people to access a Web site designed to look like a legitimate website and enter information that can be used to steal identities, bank accounts, or use credit cards that aren't their own
Pharming
Hacking into a DNS router by malicious people and changing the IP address to one that pretends to be the real site. USers being unaware that they are not at the legitimate site may enter personal information that is used maliciously.
Virus
An uninvited, self-replicating, piece of code that infects a computer and proceeds to perform its functions, which are usually destructive to the computer or files without the permission of the owner.
Trojan horse
A type of virus that comes disguised as another program. That is, a "friend" gives you what is theoretically a calculator program, but when you run it, it releases the Trojan Horse in your computer.
Adware
Software that is combined with another program and presents advertisements to the user of the program. Is sometimes distributed with free versions of downloadable software.
Spyware
Software that is downloaded surreptitiously of a user's computer and records keystrokes for transmission to a third party. May be programmed to only record keystrokes to things like blank accounts or wen the user is shopping online. Most anti-virus software today checks for this type of malware.
Firewall
A means of preventing unauthorized access to and from an Internet connection. They can involve either hardware or software or both. Further protection is provided by encrypting the information on the network. A router is a form of firewall.
Hoax
In computer, a message sent to people that is false. It is usually a warning of something. These easily proliferate by email. Check all warnings received by the email at Snopes.
Urban Legend
A story told as though it is an actual happening to someone either known by the teller, or someone he or she knows. OFten sent by email.
YOU MIGHT ALSO LIKE...
Chapter 4
51 terms
Computer Concepts
82 terms
ICT Year 9 - Summer Revision
61 terms
IT Final
54 terms
OTHER SETS BY THIS CREATOR
Chapter 68: Emergency and Disaster Nursing Lewis:…
77 terms
CNIII FINAL
221 terms
CNIII FINAL
65 terms
CNIII FINAL
65 terms