0% found this document useful (0 votes)
40 views3 pages

Chapter 3 Keywords

The document discusses various computing and networking concepts such as portable devices, data transmission methods like WiFi and Bluetooth, bandwidth, hacking, interference, brute force attacks, servers, streaming media, web browsers, URLs, IP addresses, domain names, and encryption. It also covers networking infrastructure elements like access points, DNS, errors, web pages, and security protocols. The purpose is to provide an overview of fundamental computing and internet terminology.

Uploaded by

aarizakarim2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

Chapter 3 Keywords

The document discusses various computing and networking concepts such as portable devices, data transmission methods like WiFi and Bluetooth, bandwidth, hacking, interference, brute force attacks, servers, streaming media, web browsers, URLs, IP addresses, domain names, and encryption. It also covers networking infrastructure elements like access points, DNS, errors, web pages, and security protocols. The purpose is to provide an overview of fundamental computing and internet terminology.

Uploaded by

aarizakarim2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 7.

Page 84

Portable: something that can easily be moved around.

Data: raw facts and figures ; computers understand only binary data, which is 0s and 1s

Wifi, Bluetooth , cellular data : methods for computing devices to communicate with one another radio
waves.

Page 86

Brandwidth: the amount of data that can be transmitted within a certain amount of time.

Transmission distance how far data can be sent using the transmission method

Wifi access point: a hardware device that allows devices to connect a network using wifi

Hacked: when somebody accesses a system when they are not supposed to; this is often illegal

Interference: what happens when something interrupts the transmission of a signal; this could be a
physical obstruction such as a wall or other radio waves.

Page 87

Brute-force attack: a type of cyber-attack that a hacker can make on a computer It attempts to guess a
password by using a large bank of words and phrases., it keeps trying different combinations until it
finds the correct password

Bluesnarfing: a method that hackers use to access the data on a device with Bluetooth.

Page 90

Server: a hardware device that stores and manages files and services for a network.

Streaming: watching or playing media over a computer network; play back can be started before all of
the data has downloaded

Messaging service: software that allows users to send and receive text messages between devices.

Web server: a server that provides access to web pages stored on them

Administrator: a person who is responsible for managing a network

Hard disk drive: a hardware device that is used to store a digital data

Web browser: a software application that allows users to locate, access and display information on the
world wide map

URL(Uniform Resource Locator) the address of a web page

IP(Internet protocol) address: an address assigned to each device on a network that is unique to the
network.
Home network: a network of devices that can be found in a household

Unique: only one exists; there are no duplicates

Page 91

Domain name: an easy-to-remember name for a website

Page 93

DNS(Domain name system): a system used to translate a URL to an IP address

Higher-level DNS: another DNS that is used for checking large liss of URLs and Ip addresses

404 error: an error sent to a web browser if the DNS could not find the web server

Page 97

Display window: where the content is displayed when downloaded from a web server

Navigation buttons: back, forwards and refresh buttons are included to help navigate; all browsers also
have bookmark features for saving pages.

Address bar: allows the user to type in a URL to go to a chosen website, via DNS

SSL(Secure Sockets layer):technology for keeping a connection between devices secure through
encryption

SSL certificate: a digital certificate that confirms that a website is genuine and allows it to use an
encrypted connection using SSL

Padlock icon: shows in the address bar if the page is sent via HTTPS and is secure

Protocol: set of rules for how data is sent between devices

Encryption: a process that scrambles data so that it cannot be read by unauthorized users; only the
device that the data is sent to able to decrypt the data using a key

Page 99

Hackers: people who may try to access data that they are not allowed to access

Virus: software designed to cause damage to computer systems

Verify: to check that something is correct

Page 101

Plaintext: a message before encryption or after decryption; a message that can be read easily

Encryption: a process that scrambles data so that it cannot be understood by unauthorized users; only
the device that the data is sent to is able to decrypt the data using a key

Algorithm: a sequence of steps or instructions to solve a problem


Cipher text: a message once it has been encrypted.

You might also like