Page 138 - Web Applications (803) Class 11
P. 138

Ð Ð Transmission Medium is a device that transmits data from one computer to another.
                Ð Ð A modem is a device that allows a computer to send and receive data through a phone or cable line.
                Ð Ð RJ-45 is an eight-wired connector for connecting computers on a local area network.
                Ð Ð Ethernet card is an Ethernet card is a type of network adaptor.
                Ð Ð A switch is a small piece of hardware that connects many computers in a LAN.
                Ð Ð Repeater is an electronic device that amplifies and retransmits a received signal over a network.
                Ð Ð A router is a network device that links two networks that use separate protocols.

                Ð Ð A gateway is a network device that connects two networks that are not the same.
                Ð Ð A Wi-Fi card is a compact, portable card that connects your computer to the internet over a wireless network.
                Ð Ð A protocol is a collection of rules that two or more machines on a network must follow in order to communicate.
                Ð Ð TCP (Transmission Control Protocol) divides data into packets that the network can efficiently handle.
                Ð Ð Each data packet is given a unique address (called an IP address) by the Internet protocol (IP).
                Ð Ð File Transfer Protocol (FTP) is used to transfer files across the internet from one system to another.
                Ð Ð HyperText Transfer Protocol (HTTP) is the protocol for transferring hypertext files over the Internet.
                Ð Ð The Point-to-Point Protocol (PPP) is a protocol that allows two computers to communicate via a serial interface.

                Ð Ð Simple Mail Transfer Protocol (SMTP) allows email to be sent over the Internet.
                Ð Ð POP3 stands for Post Office Protocol 3 and it receives and keeps email for a certain person till they pick it up.
                Ð Ð Telnet is a protocol that allows you to connect to a remote machine.
                Ð Ð IRC protocol is utilised for chatting.
                Ð Ð VOIP (voice over internet protocol) allows voice to be sent over a packet switched network rather than a public switched
                    telephone network.

                Ð Ð A MAC (Media Access Control) address is a unique 12-digit hexadecimal number provided to each NIC (6 digits for
                    manufacturer code and 6 digits for serial number).

                Ð Ð Each node on a network is given an IP (Internet Protocol) address, which is a four-digit hexadecimal number.
                Ð Ð A Domain Name System (DNS) name is a name given to a server (DNS).
                Ð Ð The process of obtaining a corresponding IP address from a domain name is known as domain name resolution.
                Ð Ð Malware refers to malicious software (programmes) that are meant to disrupt normal system functionality by inflicting harm
                    to the system, or to gain unauthorised access to the system, or to prevent legitimate users of computer resources access.

                Ð Ð A virus is a malicious programme that infects the host programme by attaching itself to it.
                Ð Ð A worm is a self-contained object that works on its own.
                Ð Ð Trojan Horses impersonate legitimate programmes to deceive users into installing them.
                Ð Ð A cookie is a small text file that usually contains the name of the website from which it came, as well as a unique ID tag.
                Ð Ð A firewall is a network security mechanism that is either hardware or software based.
                Ð Ð Cybercrime is defined as a crime in which a computer or the internet is utilised in an unauthorised manner to harm a user.
                Ð Ð Cyber law is an attempt to reconcile the issues posed by human activity on the internet with a legal system based on laws
                    that apply to the physical world.
                Ð Ð Intellectual Property Rights (IPR) are the rights granted to an individual over their own creation are known as intellectual
                    property rights.
                Ð Ð Hacking  was  a  phrase  used  to  describe  people  who  engage  in  inoffensive  technology  experiments  and  educational
                    activities.
                Ð Ð Cracking is a means of gaining unauthorised access to a computer with the goal of causing harm.



                136     Touchpad Web Applications-XI
   133   134   135   136   137   138   139   140   141   142   143