Please study the 18 vocabulary terms below. Then press the Mark Complete button to continue.
- authenticate
- to verify that someone is really the person they claim to be
- Bluetooth
- an open wireless protocol for exchanging data; primarily used for connecting mobile devices to computers
- client-server
- a networking model in which the functions are divided between "child" computers and a single "parent" computer which stores and controls access to data
- distributed computing
- a type of computing in which a computational task is divided into subtasks that execute on a collection of networked computers
- domain
- a named group of networked computers that are administered as a unit with common rules and procedures
- encryption
- the process of making information 'more secure' by rendering it unreadable to anyone but the intended recipient
- ethernet
- a baseband local-area network originally developed by Xerox Corp; normally running between 10 Mbps and 1,000 Mbps
- firewall
- a device or software program designed to prevent unauthorized access to a network
- groupware
- software applications that facilitate shared work on documents and information
- IP address
- a unique string of numbers that identifies a computer or server on the Internet
- LAN (local area network)
- a small computer network normally contained within one room or building
- node
- any computer or other device connected to a network
- packet
- a collection of bits normally sent through a network that contains data surrounded by error correction information
- P2P (peer-to-peer)
- a networking model where computers seamlessly share data; used primarily to reduce sever bottlenecks and reduce costs
- protocol
- a set of standards or rules which govern communication
- VPN (virtual private network)
- a high security connection to a private network
- Wi-Fi
- a trademarked, non-technical term used to describe a certain quality of wireless networking compatibility
- WAN (wide area network)
- a network which covers more than one building or area
US
UK
US
UK
The computer was very slow and took nearly 10 seconds to authenticate a user.
US
UK
US
UK
The man used Bluetooth technology to create a personal area network (PAN) between his mobile phone and his computer.
US
UK
US
UK
A standard protocol such as TCP/IP or IPX is used to define client-server interactions.
US
UK
US
UK
The professor said the Internet could theoretically be used as a giant distributed computing platform.
US
UK
US
UK
System administrators in large organizations use a domain to save time on common administration tasks.
US
UK
US
UK
The company used SSL encryption on its ecommerce web site to protect its customers while they made online purchases.
US
UK
US
UK
The man could not connect to the LAN because he forgot to bring his RJ-45 ethernet cable.
US
UK
US
UK
When the firewall was deactivated, the hacker found it easy to penetrate the system and upload a rootkit virus.
US
UK
US
UK
Since the members of the project were thousands of miles apart, a groupware application was an integral part of the solution.
US
UK
US
UK
The server's IP address was 215.44.32.134.
US
UK
US
UK
The network administrator talked with great enthusiasm about upgrading the LAN to Gigabit Ethernet.
US
UK
US
UK
The Networking 101 book said that all connected PCs, servers, and printers are nodes on a network.
US
UK
US
UK
The network administrator was upset because the network connection kept dropping packets.
US
UK
US
UK
BitTorrent is a popular and controversial peer-to-peer networking program used by millions of people to distribute data.
US
UK
US
UK
Before the Internet age, corporate LANs often ran on IPX or NetBEUI protocol.
US
UK
US
UK
The man connected to his work intranet from home using a virtual private network
US
UK
US
UK
The businessman was upset because he could not get his laptop to connect to the Wi-Fi hotspot at the convention.
US
UK
US
UK
The technical college's WAN connected all the county campuses.