Saturday, February 19, 2011

Worm

  A malicious program that replicates itself until it falls all of the storage space on a drive or network.

Virus

   It is a software used to infect your computer. it can infect data files saved in your computer.

Trojan Horse

   A program that appears to be legitimate but is designed to have destructive effects as to data residing in the computer onto wich the program was loaded.

Time bomb

A computer virus either existing independently or included in a larger program that is triggered by date or by the length of time a computer application is used.


Teleconferencing

A conference held among people in different locations by means of telecommunications equipment, such as closed circut television.

Tagging

 it is a set of bits or characters that identifies various conditions about data in a file and is often found in the header records of such files.

Pyramic Schemes

A fraudulent moneymaking scheme in which people are recruited to make payments to others.

Phishing

Iit is a internet scam designed to trick the people into revealing credit card, passwords, social security numbers and other personal information to individuals who intend to use them for fraudulent purposes.

Netiquette

a set of social communication that interacts over the internet.

Logic bomb

A computer virus that remains hidden until it is triggered when certain specific conditions are met.

Hoax

To deceive or cheat by using a hoax

Fraud

It is you are trying to buy something online and you pay with your dredit card that person can steal all your money. or they can steal your personal files and data.

Filtering

Filters use patterns (masks) against which all data are compared and only matching data are "passed through," hence the concept of a filter.

Windows mail

it is a e-mail and newsgroup client included in windows vista.

User Agent

a  A client program that is used to access servers on a network like the internet.

Text messaging

The service provided by telecommunications company for transmitting text messages.

Spam

To send (a message) indiscriminately to multiple mailing lists, individuals, or newsgroups also know as junk mail.

Signature

A unique number built into hardware or software for identification.

Friday, February 18, 2011

Packets

A short block of data transmitted in a packet swicthing network.

Mailing list

A list of users of the internet or another computer network who all receive copies of electronic mail messages.


Electronic mail (E-Mail)

A system for sending and receiving messages electronically over a computer network.

Distribution list

list of names to whom a communication should be sent.

Attachment

A document that is attached to a primary document.

Archiving

To copy or compress a file. into an archive

Address book

A file of e-mail addresses that is maintained in an e-mail program.

Saturday, February 12, 2011

Wireless lan (WLAN)

 It is links two or more devices using some sort of wireless method usually providing a connection through an access point.

Wireless Internet Service Provider (WISP)

 it is internet service provider with network built around wireless networking, ex: Wi-Fi.

Wimax

 It is a protocol that proivides mobile internet access.

Wide area network (WAN)

A communication of networks that uses devices such as telephone lines, satellite dishes, or radio waves.

T-1 line

Add caption
A type of connection used especially to connect internet service providers to the internets service infrastructure.

Server operating system

A computer system in a network that is shared by multiple users.

Server

  A computer server that processes requests for HTML and other documents that are components of webpages

Router

A device in a network that transfers messages between computers or a network.

Friday, February 11, 2011

Proxy Server

     Proxy server is a software for filtering web data, and it is used for increasing security and retricting access to certain web sites

peer-peer network

peer-peer allows internet users to transfer data directly from there computer.

Node

it is a terminal in a computer network.

Modem

it is a devise that usually transmits digital data over the telephone wires, then into an audio signal.

Local Area Connector (LAN)

it is a computer network that computers and devices. it also forms a network within a office, building.

Intranet

a maintained computer network that can only be accessed by autorized people.

Internet

a system of networks that connects your computer, and gives you acceess to the world wide web.

Hub

is a pacth cable? =)

Hacker

a person who tryies to gain total access of your computer by using any authorization.

Firewall

a firewall is used barrier to prevent any type of users from gaining access from your computer.

Extranet

 an extention of the world wide web which enables users to communicate between each other

Digital subscriber line (DSL)

a type of technology which increases the digital capacity of telephone lines.

communication channels


 
      is a pathway which data is transferred between remote devices such as a telephone line

client/ server network


           when files are stored on a highe speed file server that is available to pc users

client

               a type of  network that gives you acces data files, programs, etc. right on your computer.

cablel modem

      it is a cabel that allows you to link your computer to the internet or to a specific network or software