A Network Interface Card is a device that allows a computer to connect to a network either through wired or wireless connections.
A switch is a device that connects multiple devices on a network enabling them to communicate with each other.
Unshielded Twisted Pair cables are electrical copper cables commonly used for wired network connections such as Ethernet and are made of twisted pairs of wires.
Fiber-optic cables are cables that use thin strands of glass or plastic fibers to transmit data using light signals allowing for high-speed and long-distance data transmission.
A wireless base station also known as an access point is a device that provides wireless connectivity for devices to access a network without the need for cables.
Asymmetric Digital Subscriber Line is a type of internet connection that uses existing copper telephone lines to provide high-speed internet access. Asymmetric means the download and upload speeds are not the same.
Wi-Fi is a wireless networking technology that allows devices to connect to a local area network and access the internet without the need for physical cables.
WiMax (Worldwide Interoperability for Microwave Access) is a wireless communication technology that provides high-speed internet access over a wider area compared to Wi-Fi.
Cellular connectivity refers to the ability of devices to connect to the internet or a network using cellular networks provided by mobile network operators.
LTE (Long-Term Evolution) is a standard for high-speed wireless communication that allows faster data transfer and is commonly used for mobile internet access.
3G and 4G are generations of mobile network technology that provide data connectivity for smartphones and other mobile devices.
A modem is a device that converts the data or signal from a computer to a format that can be transmitted over a communications channel.
A router is a networking device that directs data packets between different networks allowing devices to connect to the internet or communicate with other networks.
Permissions are settings that determine the level of access and actions a user or program can have on a file folder or system.
Read permission allows a user to only read or copy a file or folder.
Write permission allows a user or program to make changes modify or add new content to a file or folder.
Execute permission allows a user or program to run or execute a program or script.
List Folder Contents permission allows a user or program to view the contents of a folder including files and subfolders.
Modify permission allows a user to read write or delete files and folders.
Full Control permission grants complete access and control over files folders and system settings including the ability to modify permissions.
User Rights are privileges granted to users that define what actions or operations they can perform on a computer system.
Administrator users are user accounts with elevated privileges that have full control over a computer system including the ability to install software modify system settings and manage other user accounts.
Standard Users are regular user accounts with limited privileges on a computer system often with restrictions on installing software or modifying system settings.
BitTorrent is a peer-to-peer file sharing protocol that allows users to distribute and download large files efficiently by dividing them into smaller pieces.
A seeder is a user who has a complete copy of a file and continues to share it with others by uploading the file's pieces to other peers in the BitTorrent network.
A peer refers to a user or computer that participates in a peer-to-peer network sharing and downloading files with other peers in the network.
A leech sometimes referred to as a "leecher" is a user who primarily downloads files from the network but contributes less or nothing in terms of sharing the files.
Online storage also known as cloud storage refers to a service that allows users to store and access their data such as files and documents on remote servers over the internet.
Remote access refers to the ability to access and control a computer or network from a remote location typically using a secure connection such as the internet.
Virtual Private Network is a technology that establishes a secure and encrypted connection over a public network such as the internet allowing users to access private networks or browse the web privately and securely.
Encryption is the process of encoding data or information in such a way that it becomes unreadable or indecipherable to unauthorized users.
Local Encryption refers to the encryption of data or files on a user's own device or computer for added security and protection.
Automatic Encryption is the process of encrypting data or files automatically without user intervention often using predefined encryption settings.
Digital Rights Management or DRM is a technology or system that controls the access usage and distribution of digital content ensuring copyright protection and preventing unauthorized copying or sharing.
SSL or Secure Sockets Layer is a cryptographic protocol that provides secure communication over the internet by encrypting data exchanged between a web server and a user's web browser.
Public key encryption also known as asymmetric encryption is a cryptographic system that uses a pair of keys a public key for encryption and a private key for decryption to secure data transmission.
Private Key Encryption: Private key encryption also known as symmetric encryption is a cryptographic system that uses a single key for both encryption and decryption of data making it faster but requiring the secure distribution of the key.
A Digital Signature verifies the authenticity and integrity of electronic messages providing assurance of the sender's identity and confirming that the content has not been tampered with.
a Digital Certificate is an electronic document that binds a public key to verify the identity of a person or organisation so they can be trusted for communication issued by a trusted third-party called a Certificate Authority (CA).
A Certificate Authority (CA) is a trusted entity or organization that issues digital certificates verifying the authenticity and identity of individuals organizations or websites involved in secure communication.