Two or more computers connected to one another to share resources.
What is a computer network?
Making files available to more than one user on the network.
What is file sharing?
These are high-speed data lines.
What are backbones?
This is stored in databases online based on an individual's online activity.
What is personally identifiable information (PII)?
This technology would be 100x faster than 5G by using higher frequencies.
What is 6G?
The physical connection. (ex.twisted pair telephone lines, coaxial cables, fiber-optic cables, etc.)
What is physical media?
This software enables the network to help people work together more closely.
What is collaborative software?
Where organizations attach to the backbone.
What is a point-of-presence (PoP)?
An attempt to steal, damage, or destroy information on a device or system.
What is a cyberattack?
This technology can identify the difference between tumor cells and healthy cells to treat cancer patients in a more comfortable way.
What are disease fighting robots?
This handles the flow of data to and from the computer in both wired and wireless networks.
What is a network interface card, or NIC?
A network in which all computers are equal.
What is a peer-to-peer network (P2PN)?
A sending computer divides information into tiny segments called packets. Each packet is marked with a delivery address, so packet switches are quick and accurate.
What are packet-switching networks?
The act of skirting or breaking through security boundaries.
What is hacking?
This technology makes online transactions nearly impossible to be hacked.
A computer connected to a computer network.
What is a workstation?
A system where one powerful computer provides information and management services to the workstation computers, called clients.
What is a client/server network?
What is a router?
These people are hired by companies to test their systems and report any flaws to the system's administrator.
What is a white-hat hacker?
This technology can market ads to suit your mood but may be an invasion of privacy.
What are emotion spotting algorithms?
A standard format for data and rules for handling it.
What is a protocol?
This system manages and secures the entire network.
What is the network operating system (NOS)?
This type of network is set-up through a public network.
What is a virtual private network (VPN)?
An attack that prevents a user from accessing the system.
What is a Denial of Service (DoS)?
This technology uses magnets to move a train at speeds of up to 310 mph with no carbon emissions.
What are maglev lines?