0% found this document useful (0 votes)
3 views2 pages

ICT Definitions

The document provides definitions and explanations of key concepts related to the World Wide Web, computer networks, and network security. It covers various network types, topologies, devices, protocols, and security measures. Additionally, it discusses user access control, password policies, and methods of authentication.

Uploaded by

koffi55koffi228
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

ICT Definitions

The document provides definitions and explanations of key concepts related to the World Wide Web, computer networks, and network security. It covers various network types, topologies, devices, protocols, and security measures. Additionally, it discusses user access control, password policies, and methods of authentication.

Uploaded by

koffi55koffi228
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

● World Wide Web: A system of interlinked hypertext documents accessed via the

internet.
● Web Browser: A software application used to access and view websites.
● Search Engine: A program that searches for and identifies items in a database that
correspond to keywords or characters specified by the user.
● Website: A collection of web pages and related content that is identified by a
common domain name and published on at least one web server.
● Web server: A computer system that delivers (serves up) web pages to users upon
request.
● Internet: A global network of interconnected computer networks that communicate
using standard protocols.
● Local Area Network (LAN): A computer network that interconnects devices within a
limited area such as a home, school, or office building.
● Wide Area Network (WAN): A computer network that spans a large geographical
area, typically across cities, countries, or even continents.
● Personal Area Network (PAN): A computer network used for data transmission
among devices such as computers, smartphones, and personal digital assistants
(PDAs) located within a few meters of each other.
● Computer network: A group of interconnected computers that can communicate
with each other and share resources.
● Star topology: A network topology in which all nodes are connected to a central hub
or switch.
● Ring topology: A network topology in which each node is connected to two other
nodes, forming a circular network.
● Bus topology: A network topology in which all nodes are connected to a single
communication line.
● Router: A device that forwards data packets between computer networks.
● Firewall: A network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
● Switch: A device that connects devices together on a computer network and uses
packet switching to forward data to its destination.
● Server: A computer program or device that provides functionality to other programs
or devices, called “clients,” on the same network.
● Network Interface Card: A hardware component that connects a computer to a
network.
● Wireless Access Point: A device that allows wireless devices to connect to a wired
network.
● Ethernet cables: A type of cable used to connect devices in a wired network.
● All-in-one devices: A device that combines multiple functions, such as printing,
scanning, copying, and faxing, into a single machine.
● Transmission Control Protocol/Internet Protocol (TCP/IP): A suite of
communication protocols used to interconnect network devices on the internet.
● Hypertext Transfer Protocol (HTTP): A protocol used to transfer data over the
World Wide Web.
● Hypertext Transfer Protocol Secure (HTTPS): A protocol used to transfer
encrypted data over the World Wide Web.
● Data packets: A unit of data that is transmitted over a network.
● Parity checking: A method of error detection in which an extra bit is added to each
character to make the number of 1s in the character either odd or even.
● Parity bits: An extra bit added to a character to make the number of 1s in the
character either odd or even.
● Parity bytes conversion: A process of converting a group of parity bits into a byte.
● Network security concerns and solutions: A set of measures taken to protect a
computer network from unauthorized access, theft, or damage.
● User access control: A security feature that limits access to a computer system or
network to authorized users.
● Password policies: A set of rules that govern the creation, use, and management of
passwords.
● Biometric Security: A security feature that uses unique biological characteristics,
such as fingerprints or facial recognition, to authenticate users.
● Two-factor authenticator: A security feature that requires two forms of
authentication, such as a password and a fingerprint, to access a computer system
or network.
● Encryption: A process of converting plain text into a coded message to prevent
unauthorized access.
● Brute force attack: A method of cracking a password by trying every possible
combination of characters until the correct one is found.

You might also like