Lecture One .
Lecture One .
_______________________________________________________________
4. She had taken her money from the bank when we came .
_______________________________________________________________
___________________________________________________________________
_____________________________________________________________
________________________________________________________
______________________________________________________________
___________________________________________________________
------------------------------------------------------------------------------------------------
T. Shaker Nasher
Lecture One
T. Shaker Nasher
Lecture One
16. Firewall: A security device or software that monitors and controls network
traffic, allowing or blocking specific connections based on predefined security
rules.
17. Encryption: The process of converting data into a coded or encrypted form
to protect it from unauthorized access or theft.
19. Backup: A copy of data or files created to protect against data loss,
allowing restoration of the data in case of accidental deletion, hardware
failure, or other issues.
20. Storage: The process and technology of storing and retrieving data on
various media or devices, such as hard drives, solid-state drives, or cloud
storage.
24. Browser: A software application used to access and view websites and
other internet resources.
26. Mobile: Referring to technology or devices that are designed for use on
the go or while in motion, such as smartphones and tablets.
T. Shaker Nasher
Lecture One
29. Big data: Large and complex sets of data that are difficult to process and
analyze using traditional methods and tools, often requiring specialized
techniques and technologies.
T. Shaker Nasher