Java Games: Flashcards, matching, concentration, and word search.

AB
digital cashelectronic replacement for cast that can be stored by your PC and spent on the Internet
routerThe centerpiece of most LANs
EthernetA wired network technology used on LANs as well as on the Internet
geolocationA process that has your IP address indicate the general region of the world where your computer is located.
ecommerceExamples: shopping online, paying utility bills, and subscribing to various online services
portAny pathway that can be used to transfer data into or out from a computer.
latencyThe time required for a signal to travel to a satellite.
InternetThe largest computer network.
modemA device that sends and receives signals that represent data.
intrusionAny access to data or programs by hackers, criminals, or other unauthorized persons.
TCP/IPStandard protocol used by the Internet to exchange data.
Internet backboneA network of high-capacity communications links that provide the main routes for data traffic across the Internet.
Internet service provider (ISP)A company that offers Internet access to individuals, businesses, and smaller ISPs
network access points (NAPs)NSP equipment and links are tied together by this.
network service providers (NSPs)Examples: AT&T, Qwest, Sprint, & Verizon
client computerThe computer that you use to access the Internet is sometimes referred to as this.
computer networkA collection of computers and related devices that are linked to share data, hardware, and software.
packetsThe TCP/IP protocol divides documents, such as e-mail, photos, and other digital messages into standard-sized _____ of data.
symmetricalAn Internet connection in which the upstream and downstream speed is the same.
asymmetricalAn Internet connection in which data travels faster downstream than upstream.
IP addressIdentifies a computer just like a street address identifies the location of a house.
always-on connectionWhen the IP address stays active even if the computer is offline.
personal firewall softwareUsed to block suspicious incoming transmissions.
Wi-FiRefers to a set of wireless networking technologies defined by IEEE 802.11 standards.
private IP addressCan be used with a LAN, but not for Internet data transport. When this is used your computer is essentially hidden from hackers.


Robidoux Middle School
MO

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities