A | B |
digital cash | electronic replacement for cast that can be stored by your PC and spent on the Internet |
router | The centerpiece of most LANs |
Ethernet | A wired network technology used on LANs as well as on the Internet |
geolocation | A process that has your IP address indicate the general region of the world where your computer is located. |
ecommerce | Examples: shopping online, paying utility bills, and subscribing to various online services |
port | Any pathway that can be used to transfer data into or out from a computer. |
latency | The time required for a signal to travel to a satellite. |
Internet | The largest computer network. |
modem | A device that sends and receives signals that represent data. |
intrusion | Any access to data or programs by hackers, criminals, or other unauthorized persons. |
TCP/IP | Standard protocol used by the Internet to exchange data. |
Internet backbone | A network of high-capacity communications links that provide the main routes for data traffic across the Internet. |
Internet service provider (ISP) | A company that offers Internet access to individuals, businesses, and smaller ISPs |
network access points (NAPs) | NSP equipment and links are tied together by this. |
network service providers (NSPs) | Examples: AT&T, Qwest, Sprint, & Verizon |
client computer | The computer that you use to access the Internet is sometimes referred to as this. |
computer network | A collection of computers and related devices that are linked to share data, hardware, and software. |
packets | The TCP/IP protocol divides documents, such as e-mail, photos, and other digital messages into standard-sized _____ of data. |
symmetrical | An Internet connection in which the upstream and downstream speed is the same. |
asymmetrical | An Internet connection in which data travels faster downstream than upstream. |
IP address | Identifies a computer just like a street address identifies the location of a house. |
always-on connection | When the IP address stays active even if the computer is offline. |
personal firewall software | Used to block suspicious incoming transmissions. |
Wi-Fi | Refers to a set of wireless networking technologies defined by IEEE 802.11 standards. |
private IP address | Can be used with a LAN, but not for Internet data transport. When this is used your computer is essentially hidden from hackers. |