Page 386 - Informatics_Practices_Fliipbook_Class12
P. 386
✥ Interception: Unauthorised user gains access to private information.
✥ Internet Relay Chat (IRC): IRC is the most commonly used text-based chat protocol.
✥ Interruption: Network service is made unavailable to the legitimate user.
✥ LAN: A Local Area Network (LAN) is typically owned privately by an organisation.
✥ Licensing: A licence is an agreement between a person or an organisation that wants to use software and the company that
owns it.
✥ MAC address: Each participating node in a network has a unique Media Access Control address (MAC address)
✥ Malware: Malware is a program that aims to hurt a computer, server, client, or computer network.
✥ MAN: A MAN typically connects various local area networks within a city.
✥ Math Functions: Math functions can be used to perform various mathematical calculations and manipulate numerical data
in MySQLqueries.
✥ Mesh Topology: A mesh topology is a network design where each device or node is directly connected to every other device
or node in the network.
✥ Mesh Topology: A mesh topology is a network design where each device or node is directly connected to every other device
or node in the network.
✥ Modification: Changing, inserting, and/or deleting information.
✥ Open Data: Open data is information that anyone can access, use, and share, possibly with the requirement that the source
of the data be cited.
✥ Order by Clause: Order By Clause sorts data on one or more columns in ascending or descending order.
✥ PAN: A Personal Area Network (PAN) is a computer network that links computers and gadgets within a person’s range.
✥ Pandas DataFrame: A Pandas DataFrame is a two-dimensional tabular structure that can accommodate objects of various types.
✥ Patent: A patent is a property right that an autonomous body (or a sovereign state) grants to the inventor for a specific
amount of time.
✥ Phishing: Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source, like a
bank or a government agency.
✥ Plagiarism: When someone passes off the words, ideas, or expressions of another author as their own, it is an act of plagiarism.
✥ POP3: Post Office Protocol version 3 (POP3) is an email protocol for receiving emails from a remote server and sending them
to a local email client.
✥ Relational schema: Relational schema describes the structure of a relation.
✥ Relationship: A relationship specifies how two entities are linked (or related) to each other.
✥ Ring Topology: In the ring topology, all devices are attached through a cable in the form of a ring (in circular fashion).
✥ Scatter Plot: A scatter plot comprises individual data points as markers on a two-dimensional graph.
✥ Series: Series is a one-dimensional data structure of Pandas module that can accommodate objects of various types.
✥ Spam: Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
✥ Star Topology: The star topology has a central controller known as a hub. All the nodes are connected to the hub.
✥ Structured Query Language (SQL): Structured Query Language (SQL) is used to create and manipulate relational databases.
✥ Switch: Switches also connect individual computers. Each computer is connected to a unique port on a switch.
✥ Text Functions: Text functions are used for manipulating and extracting information from text data.
✥ Topology: The arrangement of nodes in a network is called topology.
✥ Trademark Infringement: Unauthorised use of a brand or service mark is known as trademark infringement.
✥ Trademark: A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from those
of other sources.
✥ Trojan Horse: A Trojan horse is malware that presents as desirable and helpful but actually causes harm to the system. A
Trojan horse generally attaches itself to a safe application.
✥ Tuple: A row represents an entity’s instance (also called occurrence) and is known as a tuple.
✥ URL: A URL comprises three parts, protocol name, domain name and name of the file.
✥ Viruses: A virus is a piece of software code that can damage your system by replacing or messing up the system files.
✥ Voice over Internet Protocol (VoIP): VoIP allows us to make calls using an Internet connection.
✥ WAN: A WAN can connect across countries and continents.
✥ World Wide Web: The World Wide Web Consortium (WWWC) develops standards for the smooth growth of the World Wide Web.
372 Touchpad Informatics Practices-XII

