G12 IT Networks & E-Comms

Cards (70)

  • A Network Interface Card is a device that allows a computer to connect to a network either through wired or wireless connections.
  • A switch is a device that connects multiple devices on a network enabling them to communicate with each other.
  • Unshielded Twisted Pair cables are electrical copper cables commonly used for wired network connections such as Ethernet and are made of twisted pairs of wires.
  • Fiber-optic cables are cables that use thin strands of glass or plastic fibers to transmit data using light signals allowing for high-speed and long-distance data transmission.
  • A wireless base station also known as an access point is a device that provides wireless connectivity for devices to access a network without the need for cables.
  • Asymmetric Digital Subscriber Line is a type of internet connection that uses existing copper telephone lines to provide high-speed internet access. Asymmetric means the download and upload speeds are not the same.
  • Wi-Fi is a wireless networking technology that allows devices to connect to a local area network and access the internet without the need for physical cables.
  • WiMax (Worldwide Interoperability for Microwave Access) is a wireless communication technology that provides high-speed internet access over a wider area compared to Wi-Fi.
  • Cellular connectivity refers to the ability of devices to connect to the internet or a network using cellular networks provided by mobile network operators.
  • LTE (Long-Term Evolution) is a standard for high-speed wireless communication that allows faster data transfer and is commonly used for mobile internet access.
  • 3G and 4G are generations of mobile network technology that provide data connectivity for smartphones and other mobile devices.
  • A modem is a device that converts the data or signal from a computer to a format that can be transmitted over a communications channel.
  • A router is a networking device that directs data packets between different networks allowing devices to connect to the internet or communicate with other networks.
  • Permissions are settings that determine the level of access and actions a user or program can have on a file folder or system.
  • Read permission allows a user to only read or copy a file or folder.
  • Write permission allows a user or program to make changes modify or add new content to a file or folder.
  • Execute permission allows a user or program to run or execute a program or script.
  • List Folder Contents permission allows a user or program to view the contents of a folder including files and subfolders.
  • Modify permission allows a user to read write or delete files and folders.
  • Full Control permission grants complete access and control over files folders and system settings including the ability to modify permissions.
  • User Rights are privileges granted to users that define what actions or operations they can perform on a computer system.
  • Administrator users are user accounts with elevated privileges that have full control over a computer system including the ability to install software modify system settings and manage other user accounts.
  • Standard Users are regular user accounts with limited privileges on a computer system often with restrictions on installing software or modifying system settings.
  • BitTorrent is a peer-to-peer file sharing protocol that allows users to distribute and download large files efficiently by dividing them into smaller pieces.
  • A seeder is a user who has a complete copy of a file and continues to share it with others by uploading the file's pieces to other peers in the BitTorrent network.
  • A peer refers to a user or computer that participates in a peer-to-peer network sharing and downloading files with other peers in the network.
  • A leech sometimes referred to as a "leecher" is a user who primarily downloads files from the network but contributes less or nothing in terms of sharing the files.
  • Online storage also known as cloud storage refers to a service that allows users to store and access their data such as files and documents on remote servers over the internet.
  • Remote access refers to the ability to access and control a computer or network from a remote location typically using a secure connection such as the internet.
  • Virtual Private Network is a technology that establishes a secure and encrypted connection over a public network such as the internet allowing users to access private networks or browse the web privately and securely.
  • Encryption is the process of encoding data or information in such a way that it becomes unreadable or indecipherable to unauthorized users.
  • Local Encryption refers to the encryption of data or files on a user's own device or computer for added security and protection.
  • Automatic Encryption is the process of encrypting data or files automatically without user intervention often using predefined encryption settings.
  • Digital Rights Management or DRM is a technology or system that controls the access usage and distribution of digital content ensuring copyright protection and preventing unauthorized copying or sharing.
  • SSL or Secure Sockets Layer is a cryptographic protocol that provides secure communication over the internet by encrypting data exchanged between a web server and a user's web browser.
  • Public key encryption also known as asymmetric encryption is a cryptographic system that uses a pair of keys a public key for encryption and a private key for decryption to secure data transmission.
  • Private Key Encryption: Private key encryption also known as symmetric encryption is a cryptographic system that uses a single key for both encryption and decryption of data making it faster but requiring the secure distribution of the key.
  • A Digital Signature verifies the authenticity and integrity of electronic messages providing assurance of the sender's identity and confirming that the content has not been tampered with.
  • a Digital Certificate is an electronic document that binds a public key to verify the identity of a person or organisation so they can be trusted for communication issued by a trusted third-party called a Certificate Authority (CA).
  • A Certificate Authority (CA) is a trusted entity or organization that issues digital certificates verifying the authenticity and identity of individuals organizations or websites involved in secure communication.