The internet is a global network of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to link devices worldwide.
WAN is a network that covers a broad area, often a country or continent, connecting multiple LANs (Local Area Networks) together.
GAN refers to a network that covers a larger geographical area than a WAN, often encompassing the entire globe.
ISP is a company or organization that provides users and businesses with internet access.
Broadband refers to high-speed internet access that is faster and more efficient than traditional dial-up connections.
Bandwidth represents the maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps) or larger units like megabits per second (Mbps).
Line speed refers to the rate at which data is transmitted over an internet connection, usually measured in bits per second (bps) or Mbps.
Cap refers to a limit imposed by an ISP on the amount of data a user can upload or download within a specific time frame, typically on a monthly basis.
Shaped internet refers to a network management technique used by ISPs to control the speed or prioritize specific types of internet traffic.
Unshaped internet refers to an internet connection where there are no restrictions or prioritization applied to specific types of data traffic.
Mbps is a unit of data transfer speed, indicating millions of bits transmitted per second. It is commonly used to measure internet connection speeds.
ADSL is a type of broadband internet connection that uses existing telephone lines to transmit digital data.
Download refers to the process of transferring data, files, or content from a remote server or another computer to the user's device.
Upload refers to the process of transferring data or files from a user's device to a remote server or another computer.
A(n) modem is a device that converts digital data from a computer into analog signals for transmission over telephone lines or other communication channels. It also converts incoming analog signals back into digital data for the receiving computer.
A(n) router is a network device that directs data packets between different computer networks, determining the best path for data transmission. They also enable communication between the local network and the internet.
A(n) hotspot is a physical location where people can access the internet, typically using Wi-Fi, via a wireless local area network (WLAN). They are often found in public places like cafes, airports, and hotels.
A(n) access point is a hardware device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless communication standards.
Throttle refers to the intentional slowing down of internet speed or data transfer rate by an Internet Service Provider (ISP) after a certain usage limit has been reached, often to manage network congestion.
Instant Messaging is a real-time communication technology that allows users to send text messages, files, or multimedia content instantly over the internet.
VOIP is a technology that allows voice communication and multimedia sessions over the internet. It enables users to make phone calls and conduct video conferences using internet connections instead of traditional phone lines.
Video conferencing is a technology that enables individuals or groups in different locations to hold face-to-face meetings, discussions, or presentations over the internet using live video and audio feeds.
Cloud computing refers to the delivery of computing services, including storage, databases, servers, networking, software, analytics, and intelligence, over the internet.
Attachments are files, documents, images, or any other data added to an email or message.
FTP is a standard network protocol used to transfer files from one host to another over a network, such as the internet.
Online storage refers to a service that allows users to store and manage digital data, such as files, documents, photos, or videos, accessed via the internet.
Grid computing involves the coordinated use of multiple computers and resources across a network to solve complex problems, perform large-scale computations, or handle significant data processing tasks efficiently.
Distributed computing refers to a computing model where tasks are divided among multiple computers in a network, each contributing a portion of the computation.
The digital divide refers to the gap between individuals, communities, or countries that have access to modern information and communication technology (ICT) and those who do not.
Cybercrime refers to criminal activities conducted using computers and networks.
Malware is any software specifically designed to harm or exploit computer systems. Types include viruses, worms, Trojans, spyware, adware, and ransomware, among others.
Social engineering is a technique used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
Phishing is a type of social engineering attack where attackers use deceptive emails or websites to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
Spoofing involves disguising communication or identity to appear as someone else.
A(n) computer worm is a self-replicating malware program that spreads across computer networks without the need for user interaction, causing system slowdowns or network congestion.
A(n) computer virus is a malicious software program that attaches itself to other software or files. When these infected files are executed they damage or corrupt files, disrupt system functions, and steal sensitive data.
Spyware is software that secretly monitors and collects user information without their knowledge or consent.
A(n) keylogger is a type of spyware designed to record keystrokes on a computer or mobile device. They are used to capture sensitive information like passwords, credit card numbers, or personal messages.
A(n) Trojan is a type of malware disguised as legitimate software.
Pharming is a cyber attack where attackers redirect website traffic from a legitimate website to a fraudulent one without users' knowledge.