1 / 11

English II DEF.

English II DEF. Made by D ev Bigge Zema - For The Last two Lectures.

vaughn
Download Presentation

English II DEF.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. English II DEF. Made by DevBiggeZema - For The Last two Lectures

  2. E-mail Bankruptcy: In this day and age, most of us receive several e-mails a day. Depending on your job, you may even receive dozens of daily messages that are not spam. While it is hard enough to keep up with this plethora of e-mails received in a single day, if you fall behind a few days, it can be nearly impossible to catch up. After awhile, you may end up with hundreds of messages in your inbox that have not been replied to. • Extranet: An extranet actually combines both the Internet and an intranet. It extends an intranet, or internal network, to other users over the Internet. Most extranets can be accessed via a Web interface using a Web browser. Since secure or confidential information is often accessible within an intranet, extranets typically require authentication for users to access them.

  3. Graymail: Graymail describes email messages that are generally unwanted, but do not fit the definition of spam. Unlike spam, graymail includes messages from mailing lists and newsletters that you have legitimately signed up to receive. Over time, these messages can begin to clutter your inbox and can easily be mistaken for spam. • Hyperlink: A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the current document. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page. Text hyperlinks are often blue and underlined, but don't have to be. When you move the cursor over a hyperlink, whether it is text or an image, the arrow should change to a small hand pointing at the link. When you click it, a new page or place in the current page will open.

  4. Hypertext: Hypertext is text that links to other information. By clicking on a link in a hypertext document, a user can quickly jump to different content. Though hypertext is usually associated with Web pages, the technology has been around since the 1960s. Software programs that include dictionaries and encyclopedias have long used hypertext in their definitions so that readers can quickly find out more about specific words or topics. Apple Computer's HyperCard program also used hypertext, which allowed users to create multi-linked databases. Today, the Web is where hypertext reigns, where nearly every page includes links to other pages and both text and images can be used as links to more content. • Hypermedia: Most Web navigation is done by clicking text-based links that open new pages in a Web browser. These links, which are often blue and underlined, are referred to as hypertext, since they allow the user to jump from page to page. Hypermedia is an extension of hypertext that allows images, movies, and Flash animations to be linked to other content.

  5. ICS: Stands for "Internet Connection Sharing." ICS allows multiple computers to connect to the Internet using the same Internet connection and IP address. For example, several computers in a household can connect to same cable or DSL modem using a router. As long as the router is connected to the modem, every computer connected to the router is also connected to the Internet. Network address translation (NAT) allows the computers to share the same IP address. • ICT: Stands for "Information and Communication Technologies." ICT refers to technologies that provide access to information through telecommunications. It is similar to Information Technology (IT), but focuses primarily on communication technologies. This includes the Internet, wireless networks, cell phones, and other communication mediums.

  6. ISP: Stands for "Internet Service Provider." In order to connect to the Internet, you need an ISP. It is the company that you (or your parents) pay a monthly fee to in order to use the Internet. If you use a dial-up modem to connect to your ISP, a point-to-point protocol (PPP) connection is established with another modem on the ISP's end. That modem connects to one of the ISP's routers, which routes you to the Internet "backbone." From there, you can access information from anywhere around the world. DSL and cable modems work the same way, except after you connect the first time, you are always connected. • Mirror: A mirror is something that you can see your reflection in. Most mirrors consist of a sheet of glass with a sheet of metal behind it. When light hits the metal, it reflects onto the glass and produces the image you see. In the computer world, however, a mirror is a Web or FTP server that has the same files on it as another server. Its purpose is to provide an alternate way to access files when the main server is so swamped with people connecting and downloading files that other people can't get through. Unlike real-life mirrors, when you download a picture off a mirror server, the image isn't backwards.

  7. NAT: Stands for "Network Address Translation." NAT translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet. The router can be connected to a DSL modem, cable modem, T1 line, or even a dial-up modem. When other computers on the Internet attempt to access computers within the local network, they only see the IP address of the router. This adds an extra level of security, since the router can be configured as a firewall, only allowing authorized systems to access the computers within the network. • NetMask: A Class A netmask defines a range of IP addresses in which the first three digit section is the same, but the other sections may each contain any number between 0 and 255. Class B addresses have the same first two sections, but the numbers in the second two sections can be different. Class C addresses have the same first three sections and only the last section can have different numbers. Therefore, a Class C IP address range may contain up to 256 addresses.

  8. OSPF: Stands for "Open Shortest Path First." OSPF is a method of finding the shortest path from one router to another in a local area network (LAN). As long as a network is IP-based, the OSPF algorithm will calculate the most efficient way for data to be transmitted. • Payload: When data is sent over the Internet, each unit transmitted includes both header information and the actual data being sent. The header identifies the source and destination of the packet, while the actual data is referred to as the payload. Because header information, or overhead data, is only used in the transmission process, it is stripped from the packet when it reaches its destination. Therefore, the payload is the only data received by the destination system.

  9. Pharming: Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.Whilea typical website uses a domain name for its address, its actual location is determined by an IP address. When a user types a domain name into his or her Web browser's address field and hits enter, the domain name is translated into an IP address via a DNS server. The Web browser then connects to the server at this IP address and loads the Web page data. After a user visits a certain website, the DNS entry for that site is often stored on the user's computer in a DNS cache. This way, the computer does not have to keep accessing a DNS server whenever the user visits the website.

  10. Phishing: Phishingis similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number. However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.

  11. ان التعريفات الطويلة لازم تفهمها علشان تحفظها... عايز تلخصها مش مشكلة • ان في الامتحان مش لازم تكتب التعريفات كاملة ... اكتب بطريقة مختصرة ومفيدة • انا حاطيت التعريفات كاملة ومقصتش منها حاجة علشان تفهم المعنى كامل • كل التعريفات هتلاقيها في الموقع اللى تحت • http://www.techterms.com خليك فاكر

More Related