Page 386 - Informatics_Practices_Fliipbook_Class12
P. 386

✥   Interception: Unauthorised user gains access to private information.
        ✥   Internet Relay Chat (IRC): IRC is the most commonly used text-based chat protocol.
        ✥   Interruption: Network service is made unavailable to the legitimate user.
        ✥   LAN: A Local Area Network (LAN) is typically owned privately by an organisation.
        ✥   Licensing: A licence is an agreement between a person or an organisation that wants to use software and the company that
            owns it.
        ✥   MAC address: Each participating node in a network has a unique Media Access Control address (MAC address)
        ✥   Malware: Malware is a program that aims to hurt a computer, server, client, or computer network.
        ✥   MAN: A MAN typically connects various local area networks within a city.
        ✥   Math Functions: Math functions can be used to perform various mathematical calculations and manipulate numerical data
            in MySQLqueries.
        ✥   Mesh Topology: A mesh topology is a network design where each device or node is directly connected to every other device
            or node in the network.

        ✥   Mesh Topology: A mesh topology is a network design where each device or node is directly connected to every other device
            or node in the network.
        ✥   Modification: Changing, inserting, and/or deleting information.
        ✥   Open Data: Open data is information that anyone can access, use, and share, possibly with the requirement that the source
            of the data be cited.
        ✥   Order by Clause: Order By Clause sorts data on one or more columns in ascending or descending order.
        ✥   PAN: A Personal Area Network (PAN) is a computer network that links computers and gadgets within a person’s range.
        ✥   Pandas DataFrame: A Pandas DataFrame is a two-dimensional tabular structure that can accommodate objects of various types.
        ✥   Patent: A patent is a property right that an autonomous body (or a sovereign state) grants to the inventor for a specific
            amount of time.
        ✥   Phishing: Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source, like a
            bank or a government agency.
        ✥   Plagiarism: When someone passes off the words, ideas, or expressions of another author as their own, it is an act of plagiarism.
        ✥   POP3: Post Office Protocol version 3 (POP3) is an email protocol for receiving emails from a remote server and sending them
            to a local email client.

        ✥   Relational schema: Relational schema describes the structure of a relation.
        ✥   Relationship: A relationship specifies how two entities are linked (or related) to each other.
        ✥   Ring Topology: In the ring topology, all devices are attached through a cable in the form of a ring (in circular fashion).
        ✥   Scatter Plot: A scatter plot comprises individual data points as markers on a two-dimensional graph.
        ✥   Series: Series is a one-dimensional data structure of Pandas module that can accommodate objects of various types.
        ✥   Spam: Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
        ✥   Star Topology: The star topology has a central controller known as a hub. All the nodes are connected to the hub.
        ✥   Structured Query Language (SQL): Structured Query Language (SQL) is used to create and manipulate relational databases.
        ✥   Switch: Switches also connect individual computers. Each computer is connected to a unique port on a switch.
        ✥   Text Functions: Text functions are used for manipulating and extracting information from text data.
        ✥   Topology: The arrangement of nodes in a network is called topology.
        ✥   Trademark Infringement: Unauthorised use of a brand or service mark is known as trademark infringement.
        ✥   Trademark: A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from those
            of other sources.
        ✥   Trojan Horse: A Trojan horse is malware that presents as desirable and helpful but actually causes harm to the system. A
            Trojan horse generally attaches itself to a safe application.

        ✥   Tuple: A row represents an entity’s instance (also called occurrence) and is known as a tuple.
        ✥   URL: A URL comprises three parts, protocol name, domain name and name of the file.
        ✥   Viruses: A virus is a piece of software code that can damage your system by replacing or messing up the system files.
        ✥   Voice over Internet Protocol (VoIP): VoIP allows us to make calls using an Internet connection.
        ✥   WAN: A WAN can connect across countries and continents.
        ✥   World Wide Web: The World Wide Web Consortium (WWWC) develops standards for the smooth growth of the World Wide Web.
          372  Touchpad Informatics Practices-XII
   381   382   383   384   385   386   387   388   389   390