Front | Back |
Biometric Security Measures
|
Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system
|
Cable Modem
|
Uses coaxial cable to send and receive data
|
Client
|
A software program such as Internet Explorer
|
Client/Server Network
|
Software architectural model relationship
|
Communication Channels
|
Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these
|
Digital Subscriber Line (DSL)
|
Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines
|
Extranet
|
Similar to an intranet, but allows specific users outside of the organization to access internal information systems
|
Firewall
|
Special hardware and software that protect individual companies’ networks from external networks
|
Hacker
|
Person who breaks into computer systems to steal services and information
|
Hub
|
Small, simple, inexpensive device that joins multiple computers together
|
Internet
|
Small, simple, inexpensive device that joins multiple computers together
|
Intranet
|
A network designed for the exclusive use of people within an organization
|
Local Area Network (LAN)
|
Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area
|
Modem
|
Device that enables a computer to transmit voice data over telephone lines
|
Node
|
A device on a network; generally shares resources such as printers, software, and other hardware
|