Page 138 - Web Applications (803) Class 11
P. 138
Ð Ð Transmission Medium is a device that transmits data from one computer to another.
Ð Ð A modem is a device that allows a computer to send and receive data through a phone or cable line.
Ð Ð RJ-45 is an eight-wired connector for connecting computers on a local area network.
Ð Ð Ethernet card is an Ethernet card is a type of network adaptor.
Ð Ð A switch is a small piece of hardware that connects many computers in a LAN.
Ð Ð Repeater is an electronic device that amplifies and retransmits a received signal over a network.
Ð Ð A router is a network device that links two networks that use separate protocols.
Ð Ð A gateway is a network device that connects two networks that are not the same.
Ð Ð A Wi-Fi card is a compact, portable card that connects your computer to the internet over a wireless network.
Ð Ð A protocol is a collection of rules that two or more machines on a network must follow in order to communicate.
Ð Ð TCP (Transmission Control Protocol) divides data into packets that the network can efficiently handle.
Ð Ð Each data packet is given a unique address (called an IP address) by the Internet protocol (IP).
Ð Ð File Transfer Protocol (FTP) is used to transfer files across the internet from one system to another.
Ð Ð HyperText Transfer Protocol (HTTP) is the protocol for transferring hypertext files over the Internet.
Ð Ð The Point-to-Point Protocol (PPP) is a protocol that allows two computers to communicate via a serial interface.
Ð Ð Simple Mail Transfer Protocol (SMTP) allows email to be sent over the Internet.
Ð Ð POP3 stands for Post Office Protocol 3 and it receives and keeps email for a certain person till they pick it up.
Ð Ð Telnet is a protocol that allows you to connect to a remote machine.
Ð Ð IRC protocol is utilised for chatting.
Ð Ð VOIP (voice over internet protocol) allows voice to be sent over a packet switched network rather than a public switched
telephone network.
Ð Ð A MAC (Media Access Control) address is a unique 12-digit hexadecimal number provided to each NIC (6 digits for
manufacturer code and 6 digits for serial number).
Ð Ð Each node on a network is given an IP (Internet Protocol) address, which is a four-digit hexadecimal number.
Ð Ð A Domain Name System (DNS) name is a name given to a server (DNS).
Ð Ð The process of obtaining a corresponding IP address from a domain name is known as domain name resolution.
Ð Ð Malware refers to malicious software (programmes) that are meant to disrupt normal system functionality by inflicting harm
to the system, or to gain unauthorised access to the system, or to prevent legitimate users of computer resources access.
Ð Ð A virus is a malicious programme that infects the host programme by attaching itself to it.
Ð Ð A worm is a self-contained object that works on its own.
Ð Ð Trojan Horses impersonate legitimate programmes to deceive users into installing them.
Ð Ð A cookie is a small text file that usually contains the name of the website from which it came, as well as a unique ID tag.
Ð Ð A firewall is a network security mechanism that is either hardware or software based.
Ð Ð Cybercrime is defined as a crime in which a computer or the internet is utilised in an unauthorised manner to harm a user.
Ð Ð Cyber law is an attempt to reconcile the issues posed by human activity on the internet with a legal system based on laws
that apply to the physical world.
Ð Ð Intellectual Property Rights (IPR) are the rights granted to an individual over their own creation are known as intellectual
property rights.
Ð Ð Hacking was a phrase used to describe people who engage in inoffensive technology experiments and educational
activities.
Ð Ð Cracking is a means of gaining unauthorised access to a computer with the goal of causing harm.
136 Touchpad Web Applications-XI

