IT JARGON BUSTERS NETWORKING TERMS

Similar documents
Copyright 2006 Prentice-Hall. All rights reserved. 1

The process by which a user can associate specific permissions to each username.

The personal computer system uses the following hardware device types -

Chapter 11: Networks

Total Mark out of 35

Chapter 11: It s a Network. Introduction to Networking

Available Instructor Resources Resource File Name Found

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

NHS South Commissioning Support Unit

System recommendations for version 17.1

SUMMARIES OF INTERACTIVE MULTIMEDIA

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Aprima 2015 System Requirements

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

ST VENERA BOYS SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2014~15 Information and Communication Technology

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

INTERNET SAFETY IS IMPORTANT

Vocabulary Bank organized by module

Elementary Computing CSC 100. M. Cheng, Computer Science

CommPortal Communicator Desktop End User Guide 19 Feb 2014

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

CAO 152C. Intermediate Windows Week 5

Unit 4 Part A Evaluating & Purchasing a Computer. Computer Applications

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

$ $ $999.99

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Chapter 5 Local Area Networks. Computer Concepts 2013

System recommendations for version 17.1

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published

Easy to connect to internet & browse or listen to music or videos A range of software and programs can be used for home, business, education etc

Malware, , Database Security

Positioning Document. DIR-657 Wireless N HD Media Router

Unit 2 Assignment 2. Software Utilities?

How to find your IP address information

Ferenc Peták Department of Medical Physics and Informatics 2018

Aprima 2016 SYSTEM REQUIREMENTS

Aprima 2016 System Requirements

Elementary Computing CSC M. Cheng, Computer Science 1

CSC 170 Introduction to Computers and Their Applications. Computers

Microsoft Exam Mobility and Devices Fundamentals Version: 6.0 [ Total Questions: 37 ]

Owner of the content within this article is Written by Marc Grote

Computer Technology Flash Card 2

MusicOne Stick User Guide (v1.2) User Guide

Security Awareness. Presented by OSU Institute of Technology

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Networking. Prof. Abdul Hameed

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

St. Benedict s High School. Computing Science. Information Systems Design & Development. (Part 2 Computer Systems) National 5

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Performance

CONTENTS IN DETAIL INTRODUCTION

Introduction... 3 Package Contents... 4 VPN100 LEDs... 5 Connecting your VPN Installing USB drivers... 7

BACK TO BASICS PART I. Hardware & it s Associated Terminology

+ SMART WAY THE. to control access to. YOUR property. Janus Access Control. Janus. Operator s Manual. For Version

1. Introduction. 1.1 Cosmo Specifications

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them

Get to know your Modem 1. Modem Technical Overview 3

Introduction to the Internet. Part 1. What is the Internet?

A guide to VoIP for small to medium sized business

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide

Understanding Routers, Switches, and Network Hardware

Which one of the following terms describes the physical components of a computer system?

elc International School

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

The Library Res-Net Troubleshooting Guide

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

CompTIA A+ Accelerated course for & exams

Preparing for JT Fibre

Module 1 Concepts of Information and Communication Technology (ICT)

AVANTUS TRAINING PTE LTD

Allan Hancock College Computer Training

Chapter 1 B: Exploring the Network

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

College of Pharmacy Windows 10

What is Data Storage?

Client Server and Peer to Peer Networks

Clevertouch Plus Blade PC

The ULTIMATE GUIDE. to Buying Networking Equipment

UU100 EPORTFOLIO ACTIVITY 1

Technology in Action

Tablet MODECOM FreeTAB1004 IPS X4

Leading the New Era of WiFi. Nighthawk AC1750 Smart WiFi Router Dual Band Gigabit. Data Sheet R6700

How much data can a BluRay hold?

AC1750 Smart WiFi Router ac Dual Band Gigabit

Monsoon System Requirements

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

BEST PRACTICES FOR PERSONAL Security

Chapter 4: Networking and the Internet

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

AC1200 Smart WiFi Router

Manual Format Flash Drive For Mac And Pc Use Same

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software

Transcription:

IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or in work. Examples of this are ADSL Broadband, Fibre Broadband (such as BT Infinity), or more advanced connections that go outside of the business. It can also be referred to as the Public LAN Local Area PAN Personal Area VPN Virtual Private DHCP Dynamic Host Control Protocol PoE Power over Ethernet DNS Domain Name System The LAN is a network of computers and devices (such as printers), that are connected over a small area, such as in a home or office. These devices are typically connected either using an Ethernet cable, or by some form of Wireless device. This is referred to as a Private. A PAN is used to connect devices over a very small distance. Examples of this are connecting a laptop to a smartphone using Bluetooth. It is generally only used by one person. A VPN is usually used to connect a remote worker onto a computer network that belongs to a business. Alternatively, it can be used to link more than one sites at different locations together. Essentially, it creates a private link across a public network (e.g. the Internet). DHCP is commonly used in any Router and in Business networks may also be used from a Server. When a device is connected to a network, either by a wired Ethernet cable or wireless, DHCP will allocate the device a unique IP address on the network so that it can communicate in the correct way. Power is sent over an Ethernet (network) cable, to provide power as well as to send data. Essentially this cuts the requirement for a device such as an office phone to use a separate mains power supply. DNS is used to translate human readable names (such as the name of an internal device, or a website), into a machine readable IP address that is either on the local network, or an address on the Internet. Imagine it as a giant phonebook, where it is easier to remember a name as opposed to a number.

IP Address Internet Protocol Address IP addresses are unique identifiers of a device such as computer or printer on a. A laptop or printer would contain an Internal IP address. A router would also have a unique IP address, which is part of the Internet. VoIP Voice over Internet Protocol VoIP allows for communication over the Internet Protocol (e.g. the Internet or an Internal ). This can be in the form of Voice (similar to the handset that may be plugged into a BT socket at home), but nowadays contains extended features such as messages and video. Examples of this include Skype or Facetime, but also uses handsets for businesses. NETWORKING HARDWARE Ethernet A cable that is used to connect a device (such as a computer, printer or even a smart TV) to a network device (e.g. router or switch). It can then provide connectivity to the Internet for communication of any kind (Email, Web browsing, or video and audio streaming) Switch A switch is used to expand a private network, and allow connection of more devices, whether it is printers or computers or any other device which would use an Ethernet cable. Switches can also incorporate PoE to provide power to office desk phones. The hardware typically has between 5 and 48 sockets available, one of which would need to be connected to a router or another switch to allow connectivity. Router A Router is a piece of hardware that allows connection between a local internal network (private) and an external network e.g. the Internet (public). It will usually be used for many functions such as a Firewall, DHCP, DNS and VPN. Nearly all Broadband providers will use a router of some sort to connect your devices to the Internet. Firewall A firewall is used to monitor and protect a network from unauthorised access. This could be to protect an internal network from attacks outside of the network (from the Internet). The majority of routers will have a firewall built in. Business firewalls will allow for a much greater set of options to block incoming data. Computers can also have a firewall installed for added security.

SECURITY Malware Malicious Software Malware is a generic term that is used when relating to viruses, spyware and ransomware. Below are some of the more popular types, but it is inevitable that different types will start to appear. Virus Spyware Trojan Horse Adware A virus is a program that reproduces itself, and attaches itself to other programs that are installed on a Computer. Its main intent is to take control of a Computer to perform tasks that aren't usually carried out, often without the user s knowledge. Spyware is used to gain information about a person or business, and send that information to someone else without the user knowing that it has been sent. A Trojan is used to hack a Computer by misleading the user of the purpose or intent. For example, you may receive a popup to say that you have a virus and to install a program that will fix this. This will actually install further viruses causing more problems, often asking for money to buy the program. The term derives from the Ancient Greeks that used a wooden horse to gain entrance into Troy. Adware is one of the most popular forms of malware, and is software that displays unwanted advertising when browsing online. It is also used to redirect your Internet Browser to a different search engine, with a purpose to generate revenue for the creator of the software. Ransomware Ransomware is a growing form of malware, and as the name suggests holds users ransom to their data unless a fee is paid. It does this by encrypting data such as word and excel documents along with photos, and requires the purchase of Bitcoins to assist in getting these decrypted and back to a usable state. Worm A computer Worm is a malicious piece of software that replicates itself and then spreads itself to other computers that are on a network. The purpose of a Worm can be to slow the network down as it spreads across and pass on the malicious code to others over the Internal, or as an example sending emails out the senders of emails in Microsoft Outlook as an attached file, therefore going outside of the original.

COMPUTER COMPONENTS CPU Central Processing Unit RAM Random Access Memory Commonly referred to as the processor, this is the brains of the Computer, where calculations are carried out. Terms such as Dual core and Quad core are associated with the processor and is the basic calculation component of the Processor RAM is used for storing data once it has been retrieved from a data storage device such as Hard Drive or Solid State Disk, allowing for faster calculations to be carried out. A greater amount of RAM allows for more programs and documents to be opened at once, without affecting performance. Motherboard A motherboard is the main circuit board found in a Computer. It is used to control all of the other components, and the flow of data between these.

DATA STORAGE This component found in a PC that holds all of the data. This includes the Operating System files (Such as Windows 10), Any applications (such as Microsoft Word or Excel), and your Personal data (such as Pictures, Music, Videos and documents). HDD Hard Disk Drive It works by using a rotating disk at a high speed of between 5400 and 15000rpm, and a mechanical arm that moves to the area where the data is held, or where it will be stored. Although these drives are very common, their use as the main storage device is declining, and is now being used for a secondary storage device, or as an external device such as a USB External HDD. Typical hard drive sizes are 500GB, 1TB, 2TB, but can reach 8TB per SSD Solid State Drive The SSD is becoming more popular as a choice for data storage. It does not involve the use of a rotating disk or arm, but instead uses flash memory (similar to the memory found in modern smartphones), but at a larger and faster capacity. They run silently, produce less power and are also better at withstanding physical knocks, which make them especially useful in laptops. Popular sizes of SSD are 120GB, 240GB and 480GB but can reach storage sizes of 3.2TB, although the cost significantly raises Flash Memory Flash memory is found in many different forms. This can be either an SD Card used in many digital cameras, MicroSD found in many phones for additional storage, or USB Flash drives (commonly known as USB Sticks). They range in data storage capacity, currently 32GB, 64GB or 128GB are popular given the cost, but 512GB flash memory types are available. If you found this article useful or would like to talk more about how we can help you, your business or enterprise don t hesitate to get in touch on 0800 069 9788 or hello@dynamiq.co