| A | B |
| Analog signal | Data transmitted as a series of waves. |
| Authentication | Security process that requires a user to enter a valid user name and password to confirm they are allowed to access a network. |
| Authorization | Process used by a network administrator to determine what level of access a user is allowed to have based on who they are. |
| Client | Computer that accesses resources on a network. |
| Client-server model | Arrangement of computers in a network where the server shares resources and clients access them. |
| Data encryption | Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it. |
| Digital signal | Data transmitted as a series of 1s and 0s. |
| Ethernet | Standard that defines everything about modern network hardware, including the connectors, the cable, and the signals used to transmit data. |
| Extranet | Private intranet that is also made accessible to a select group of outsiders over the Internet. |
| Firewall | Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network. |
| Hub | Hardware device used to connect computers in a network; repeats all data to every cable connected to the network. |
| Internet | Worldwide network connecting millions of computers and other networks. |
| Intranet | Private network for a very specific group of users. |
| Local area network (LAN) | Network of computers in a single physical location. |
| Mainframe | Powerful computers that specialize in multitasking and supporting hundreds of sessions at the same time. |
| Minicomputer | Scaled down mainframe also used to service many user sessions. |
| Modem | Device used to connect a computer to a network through telephone lines; converts analog signals transmitted over phone lines into digital signals used by the computer. |
| Network | Group of linked computers that can share resources. |
| Network administrator | Individual who sets up, configures, troubleshoots and controls access to a network. |
| Network frame | Coding used to address each packet of data transmitted over a network. |
| Network Interface Card (NIC) | Computer component that connects a computer to a network. |
| Network resources | Shared files and services, including hardware like printers. |
| Node | Any machine attached to a network: client, server, printer, and so on. |
| Packet | Small, individually numbered unit of data sent over a network. |
| Peer-to-peer model | Network model where all of the computers act both as clients and servers. |
| Personal computer (PC) | Also known as a microcomputer. |
| Principle of Least Access | Approach to network security that requires network administrators to take every measure possible to prevent access to any part of a network that shouldn’t be accessed by a particular user. |
| Proxy server | Computer system that acts as an intermediary in network communication. |
| RJ-45 | Type of connector used for Ethernet cable. |
| Security | Issues relating to controlling access to data and resources on a network. |
| Server | Specialized PC system used to store and share data on a network. |
| Supercomputer | Mainframe computer used to perform a single task at a time. |
| Switch | Device used to connect computers in a network that only sends data along the appropriate connection. |
| Wide area network (WAN) | Two or more local networks (LANs) connected together. |
| Wireless access point (WAP) | Wireless hub used to connect computers on a wireless network. |
| Workgroup | Group of computers connected together for sharing files and printers. |
| Workstation | Single-user computer with a powerful microprocessor and a higher-quality monitor. |