| A | B |
| digital cash | electronic replacement for cast that can be stored by your PC and spent on the Internet |
| router | The centerpiece of most LANs |
| Ethernet | A wired network technology used on LANs as well as on the Internet |
| geolocation | A process that has your IP address indicate the general region of the world where your computer is located. |
| ecommerce | Examples: shopping online, paying utility bills, and subscribing to various online services |
| port | Any pathway that can be used to transfer data into or out from a computer. |
| latency | The time required for a signal to travel to a satellite. |
| Internet | The largest computer network. |
| modem | A device that sends and receives signals that represent data. |
| intrusion | Any access to data or programs by hackers, criminals, or other unauthorized persons. |
| TCP/IP | Standard protocol used by the Internet to exchange data. |
| Internet backbone | A network of high-capacity communications links that provide the main routes for data traffic across the Internet. |
| Internet service provider (ISP) | A company that offers Internet access to individuals, businesses, and smaller ISPs |
| network access points (NAPs) | NSP equipment and links are tied together by this. |
| network service providers (NSPs) | Examples: AT&T, Qwest, Sprint, & Verizon |
| client computer | The computer that you use to access the Internet is sometimes referred to as this. |
| computer network | A collection of computers and related devices that are linked to share data, hardware, and software. |
| packets | The TCP/IP protocol divides documents, such as e-mail, photos, and other digital messages into standard-sized _____ of data. |
| symmetrical | An Internet connection in which the upstream and downstream speed is the same. |
| asymmetrical | An Internet connection in which data travels faster downstream than upstream. |
| IP address | Identifies a computer just like a street address identifies the location of a house. |
| always-on connection | When the IP address stays active even if the computer is offline. |
| personal firewall software | Used to block suspicious incoming transmissions. |
| Wi-Fi | Refers to a set of wireless networking technologies defined by IEEE 802.11 standards. |
| private IP address | Can be used with a LAN, but not for Internet data transport. When this is used your computer is essentially hidden from hackers. |