Giberish | Meaningless data |
Impostor | Person pretending to be someone else |
Decipher | Convert to meaningful data |
MAC | Message-authentication code |
Tenets | Principal features |
Tamper | Make unauthorised changes |
sender's private key | to encrypt the MAC of a digital signature |
trusted issuer's private key | to encrypt the MAC of a message |
the recipent's private key | to decrypt a received message |
the recipent's public key | to encrypt a message for sending |
BT | British Telecom |
Smart phone | A telephone that can translate English into various languages in real-time |
Intelligent agent | A computer program that watches, learns and communicates with the user |
Rocket science | Very advanced study |
R&D | Research and development |
Upload | Transfer data from a client device to a server computer |
Supercomputer | Most powerful type of computer |
Bluetooth | A microwave high-speed wireless link system designed to work with portable equipment |
SM band | An unlicensed frequency range at 2.45GHz |
RF | Radio frequency |
IEEE 802.11 | A standard for networking systems with a packet-switching protocol |
Frequency hopping | Constantly switching channels |
Usable density | The number of devices that can be used the same area |
piconet | Very low power network links between Bluetooth devices |
NAS | Network attached storage |
Fibre Channel | A type of high speed interconnection |
SAN | Storage area network |
Mirror | Write copies of data to two disks at the same time |
Server farm | A large collection of computers that work together to provide services on a network |
Disk array | A set of interconnected disks |
misdirection routine | hides the presence of the code |
reproduction routine | attaches a copy of itself to another program |
trigger routine | decides when and how to activate the payload |
payload routine | does the damage |
RAID | Redundant array of inexpensive disks |
RAID controller | A device for controlling a set of hard disks |
An array | A set |
Striping | A process of spreading data across a set of disks |
Mirroring | The tehinique of writing the same information to more than one drive |
Parity data | Information which is used to restore data if one of the RAID drivers fail |
ISDN | Integrated Services Digital Network |
TA | Device installed on a PC to allow it to recive ISDN signals |
Data channel | Digital channel used to carry ISDN signalling and supervisory information to the network |
Bearer channel | Digital channel used to carry ISDN data |
DSL | Digital Subscriber Line |
Splitter-based services | DSL system that separates the digital signals from the analogue signals |
ADSL | Asymmetric Digital Subscriber Line |
Metadata | Data about data |
Metalanguage | A language from which you can create other languages |
HTML | A coding system used for structuring and formatting documents |
XML | Extensible markup language |
Markup language | An example of a page presentation language |
SMTP | A simple mail transfer protocol that is used to send messages between servers |
'Push' operation | An email transfer process in which the connection is initiated by the sending computer |
POP | A message-retrieval protocol that downloads all email messages at the same time |
'Pull' operation | An email transfer process in which the receving computer initates the connection |
IMAP | A mail transfer protocol that initially only retrieves the message headers |
Internet address | A 32-bit number identifying a node on an IP network |
Resolution Protocol | Standard used for software that routes data through a gateway |
Look-up table | Stored information used to route data through a gateway |
Gateway | A device for connecting dissimilar networks |
User Datagram Protocol | Moves information to the correct application on receving system of a network |
Transmission Control Protocol | Manages communication exchanges between computers on the internet |
Bracketing | Set of boundaries for the beginning and end of a mesage |
Half-duplex | Transmission mode in which each computer takes turns sending and receving |
Full-duplex | Transmission mode in which both computers send and recive at the same time |
Checksum | Mathematical calculations based on the contents of data |
Website | Collection of related webpages |
ASP | Application service provider |
Virus | Self-replicating program |
Office suite | Set of standard programs used in an office |
Bandwidth | Capacity of a network connection |
Broadband | High capacity Internet connection |
Data centre | Facility for storing large amounts of information |
SAP | Common enterprise resource planning tool |
GUI | Graphical user interface |
Multimodal interface | A system that allows a user to interact with a computer using a combination of inputs |
Intelligent agent | Software assistant that performs tasks such as retrieving and delivering information |
TTS | Text to speech |
The Intelligent Room | A project of the Massachusetts Institute of Technology's Artificial Intelligence Lab |
Kernel | The core of an operating system that handles memory allocation, talks to hardware devices |
Free Software Fundation | An organisation of volunteers dedicated to making good software that anyone could use without paying |
Source code | The orginal systems program from which compiled programs are generated |
Open source | A type of software development where any programmer can develop or fix bugs in the software |
A distribution | A complete operating system kit with the untilities and apps you need to make it to be useful |
X | A standard distributed windowing system on which people implement graphical interfaces |
Data mining | A process of filtering through large amounts of raw data for useful information |
AI | A computing tool that tries to operate in a way similar to the human brain |
Cleansed data | Data free from duplicate and erroneus information |
Data warehouse | Storage method of archiving large amounts of data to make it easy to acces |
Cache hit | The processor is succesful in finding the data in the cache |
Cache controller | The logic circuits used to control the cache process |
Cache coherency | Ensuring that any changes written to main memory are reflected within the cache and vice versa |
Write-through cache | The process of writing directly to both the cache and memory at the same time |
Write-back cache | The process of writing only to the cache and not to memory unless the space is used to cache new dat |
Line size | The amount of data transferred to the cache at any one time |
Edutainment | Multimedia materials with a combination of educational and entertainment content |
Multimedia | A combination of text with sound, video, animation, and graphics |
Expert system | Software that enables computers to 'think' like experts |
Telecommute | Use computers to stay in touch with the office while working at home |
Information superhighway | Internet system designed to provide free interactive acces to resources for humanity |