The largest network in the world is...
Internet
Internet and WWW:
Internet:
- connects millions of computers globally and allows them to communicate each other.
WWW(World Wide Web):
- accessing information on all this networked computers and makes use of web pages and web browsers to store nd access information.
Router
Reads the address of information to determine the final destination of the packet.
NIC
Network Interface Card
Web browser is...
program that allows web pages stored on the internet to be viewed.
Internet stands for...
INTERnational NETwork
Hub and Switch:
Hub:
- does not manage any of the data traffic through it.
- operates on the physical layer.
- when a packet arrives at one port, all network devices of the LAN can see all packet.
Switch:
- work in a more intelligent way compared to hubs.
- operates on the data link layer.
- sends a packet of data only to the computer it is intended for.
Anti - adware software
To find out and remove adware (advertisements).
WLAN
Wireless Local Area Network
Hotspot is...
areas where the internet can be accessed wirelessly using Wi - Fi. Example: public places, coffee bars, hotels, airports, etc.
Why is it called Wi - Fi?
Wi-Fi (от английского словосочетания Wireless Fidelity, которое можно дословно перевести как «беспроводная точность»
Range of Wi - Fi and Bluetooth:
Wi - Fi:
- indoor 50m and 100m
Bluetooth:
- depends on the power of signal and from 5m to 100m
Modem
Converts the data from the computer (digital data) into sound (analogue data) that can be sent along ordinary telephone lines and convert back to digital data that can be understood by the receiving computer.
HTML
Hypertext Markup Language
Malware is...
(malicious software) software that intentionally damages your computer, server or network.
Asterisk is...
the character * used in printing or writing as a reference mark, as an indication of the omission of letters or words, to denote a hypothetical or unattested linguistic form.
Strong and Weak Password:
Strong:
- contains symbols, capitals, numbers and letters.
- protects you from cyber criminals
Weak:
- contains low characters and personal information.
- very easy to crack.
Bridge
Connects multiple LANs (local area networks) together to form a larger LAN.
URL
Uniform Resource Locators (web address)
Two - factor authentication is...
a security process in which users provide two different authentication factors to verify themselves.
Why is it called Bluetooth?
Scandinavian king whose nickname was blátǫnn in Old Norse or Blåtand in Danish. These words mean Bluetooth–no cookies for guessing. The king was named Bluetooth as he had a dead tooth that looked blue.
Internet and Intranet:
Internet:
- contains information about everything.
- can be used by everyone.
Intranet:
- contains only information concerning a particular organization.
- used by the employees of particular organization.
ISP
(Internet Service Provider) organization that supplies the connection to the internet.
Intranet
INTernal Restricted Access NETwork
Zero login is...
you don't need to supply your normal login details, instead you will use an external authenticator such as security key or a smartphone.