Saturday, December 18, 2010

Worm


A malicious program that replicates itself until it fills all of the storage space on a drive or network.

Virus


A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.

Urban Legend


An apocryphal story involving incidents of the recent past, often including elements of humor and horror, that spreads quickly and is popularly believed to be true.

Trojan Horse


A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.

Time Bomb


A bomb with a detonating mechanism that can be set for a particular time.

teleconferencing


A conference held among people in different locations by means of telecommunications equipment, such as closed-circuit television.

Tagging


A label assigned to identify data in memory.

RDF Summary


A syndication format that was developed by Netscape in 1999 and became very popular for aggregating updates to blogs and news sites.

Pyramid Schemes


A fraudulent moneymaking scheme in which people are recruited to make payments to others above them in a hierarchy while expecting to receive payments from people recruited below them.

Phishing


Phish is an Internet scam designed to trick the recipient into revealing credit card, passwords, social security numbers and other personal information to individuals who intend to use them for fraudulent purposes.

Netiquette


Etiquette practiced or advocated in electronic communication over a computer network.

Logic Bomb


A computer virus that remains hidden until it is triggered when certain specific conditions are met.

hoax


An act intended to deceive or trick.

Fraud


One who assumes a false pose. also known as a impostor.

Filtering


To change data. In this usage of the term, the concept of a filter a pass-through device is less obvious, but nevertheless widely used.

Windows Mail


The e-mail and newsgroup client in Windows Vista.

User Agent


A client program that is used to access servers on a network, typically the Internet.

Text Messaging


Sending short messages over a cellphone network.

Spam


To send unsolicited e-mail to.

Signature


A letter, number, or symbol placed at the bottom of the first page on each sheet of printed pages of a book as a guide to the proper sequence of the sheets in binding.

Packets


A block of data that is transmitted over the network in a packet-switched system.

Mailing List


A list of users of the Internet or another computer network who all receive copies of electronic mail messages.

Instant Messaging


The transmission of an electronic message over a computer network using software that immediately displays the message in a window on the screen of the recipient.

e-mail Address


A string, usually of the form username@host.com or username@host.net, that must be entered into the To: field of an e-mail message to ensure proper delivery.

Electronic Mail (e-mail)


A system for sending and receiving messages electronically over a computer network, as between personal computers.

Distribution List


list of names to whom a communication should be sent

Attachment


To link a file to an e-mail message so that they travel together to their destination.

Archiving


To copy or compress a file into an archive.

Address Book


A feature in an e-mail program for storing e-mail addresses.

Friday, December 10, 2010

Wireless LAN (WLAN)


A communications network that provides connectivity to wireless devices within a limited geographic area. also know as Wi-fi

Wireless Internet Service Provider(WISP)


Its an Internet service providers with networks built around wireless networking.

WiMax


A wireless wide area network technology that conforms to certain parts of the IEEE 802.16 standard.

Wide area Network (WAN)


A communications network that uses such devices as telephone lines, satellite dishes, or radio waves to span a larger geographic area than can be covered by a LAN.

T-1 Line


Type of broadband telecommunications connection used especially to connect Internet service providers to the Internet's infrastructure.

Server Operating System


A computer system in a network that is shared by multiple users.

Server


A computer that processes requests for HTML and other documents that are components of webpages.

Router


A device in a network that handles message transfers between computers.

Public Switched Telephone Network (PSTN)


The worldwide voice telephone network.

Proxy Server


Software for caching and filtering Web content to reduce network traffic on intranets, and for increasing security by filtering content and restricting access.

Peer-Peer Network


A local-area network in which there is no central controller and all the nodes have equal access to the resources of the network.

Node


Its A terminal in a computer network.

Modem


A device for transmitting usually digital data over telephone wires by modulating the data into an audio signal to send it and demodulating an audio signal into data to receive it.

Local Area Conector (LAN)


A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.

Intranet


Its A privately maintained computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.

Internet


An interconnected system of networks that connects computers around the world via the TCP/IP protocol.

Thursday, December 9, 2010

Hub


A center of activity or interest

Hacker


A person who uses a computer system without a specific, constructive purpose or without proper authorization.

Firewall


An extension of an institution's intranet, especially over the World Wide Web, enabling communication between the institution and people it deals with, often by providing limited access to its intranet.

An extension of an institution's intranet, especially over the World Wide Web, enabling communication between the institution and people it deals with, often by providing limited access to its intranet.

Digital Subscriber Line (DSL)


A technology that significantly increases the digital capacity of ordinary telephone lines the local loops into the home or office.