Giberish | Meaningless data | |
Impostor | Person pretending to be someone else | |
Decipher | Convert to meaningful data | |
MAC | Message-authentication code | |
Tenets | Principal features | |
Tamper | Make unauthorised changes | |
sender's private key | to encrypt the MAC of a digital signature | |
trusted issuer's private key | to encrypt the MAC of a message | |
the recipent's private key | to decrypt a received message | |
the recipent's public key | to encrypt a message for sending | |
BT | British Telecom | |
Smart phone | A telephone that can translate English into various languages in real-time | |
Intelligent agent | A computer program that watches, learns and communicates with the user | |
Rocket science | Very advanced study | |
R&D | Research and development | |
Upload | Transfer data from a client device to a server computer | |
Supercomputer | Most powerful type of computer | |
Bluetooth | A microwave high-speed wireless link system designed to work with portable equipment | |
SM band | An unlicensed frequency range at 2.45GHz | |
RF | Radio frequency | |
IEEE 802.11 | A standard for networking systems with a packet-switching protocol | |
Frequency hopping | Constantly switching channels | |
Usable density | The number of devices that can be used the same area | |
piconet | Very low power network links between Bluetooth devices | |
NAS | Network attached storage | |
Fibre Channel | A type of high speed interconnection | |
SAN | Storage area network | |
Mirror | Write copies of data to two disks at the same time | |
Server farm | A large collection of computers that work together to provide services on a network | |
Disk array | A set of interconnected disks | |
misdirection routine | hides the presence of the code | |
reproduction routine | attaches a copy of itself to another program | |
trigger routine | decides when and how to activate the payload | |
payload routine | does the damage | |
RAID | Redundant array of inexpensive disks | |
RAID controller | A device for controlling a set of hard disks | |
An array | A set | |
Striping | A process of spreading data across a set of disks | |
Mirroring | The tehinique of writing the same information to more than one drive | |
Parity data | Information which is used to restore data if one of the RAID drivers fail | |
ISDN | Integrated Services Digital Network | |
TA | Device installed on a PC to allow it to recive ISDN signals | |
Data channel | Digital channel used to carry ISDN signalling and supervisory information to the network | |
Bearer channel | Digital channel used to carry ISDN data | |
DSL | Digital Subscriber Line | |
Splitter-based services | DSL system that separates the digital signals from the analogue signals | |
ADSL | Asymmetric Digital Subscriber Line | |
Metadata | Data about data | |
Metalanguage | A language from which you can create other languages | |
HTML | A coding system used for structuring and formatting documents | |
XML | Extensible markup language | |
Markup language | An example of a page presentation language | |
SMTP | A simple mail transfer protocol that is used to send messages between servers | |
'Push' operation | An email transfer process in which the connection is initiated by the sending computer | |
POP | A message-retrieval protocol that downloads all email messages at the same time | |
'Pull' operation | An email transfer process in which the receving computer initates the connection | |
IMAP | A mail transfer protocol that initially only retrieves the message headers | |
Internet address | A 32-bit number identifying a node on an IP network | |
Resolution Protocol | Standard used for software that routes data through a gateway | |
Look-up table | Stored information used to route data through a gateway | |
Gateway | A device for connecting dissimilar networks | |
User Datagram Protocol | Moves information to the correct application on receving system of a network | |
Transmission Control Protocol | Manages communication exchanges between computers on the internet | |
Bracketing | Set of boundaries for the beginning and end of a mesage | |
Half-duplex | Transmission mode in which each computer takes turns sending and receving | |
Full-duplex | Transmission mode in which both computers send and recive at the same time | |
Checksum | Mathematical calculations based on the contents of data | |
Website | Collection of related webpages | |
ASP | Application service provider | |
Virus | Self-replicating program | |
Office suite | Set of standard programs used in an office | |
Bandwidth | Capacity of a network connection | |
Broadband | High capacity Internet connection | |
Data centre | Facility for storing large amounts of information | |
SAP | Common enterprise resource planning tool | |
GUI | Graphical user interface | |
Multimodal interface | A system that allows a user to interact with a computer using a combination of inputs | |
Intelligent agent | Software assistant that performs tasks such as retrieving and delivering information | |
TTS | Text to speech | |
The Intelligent Room | A project of the Massachusetts Institute of Technology's Artificial Intelligence Lab | |
Kernel | The core of an operating system that handles memory allocation, talks to hardware devices | |
Free Software Fundation | An organisation of volunteers dedicated to making good software that anyone could use without paying | |
Source code | The orginal systems program from which compiled programs are generated | |
Open source | A type of software development where any programmer can develop or fix bugs in the software | |
A distribution | A complete operating system kit with the untilities and apps you need to make it to be useful | |
X | A standard distributed windowing system on which people implement graphical interfaces | |
Data mining | A process of filtering through large amounts of raw data for useful information | |
AI | A computing tool that tries to operate in a way similar to the human brain | |
Cleansed data | Data free from duplicate and erroneus information | |
Data warehouse | Storage method of archiving large amounts of data to make it easy to acces | |
Cache hit | The processor is succesful in finding the data in the cache | |
Cache controller | The logic circuits used to control the cache process | |
Cache coherency | Ensuring that any changes written to main memory are reflected within the cache and vice versa | |
Write-through cache | The process of writing directly to both the cache and memory at the same time | |
Write-back cache | The process of writing only to the cache and not to memory unless the space is used to cache new dat | |
Line size | The amount of data transferred to the cache at any one time | |
Edutainment | Multimedia materials with a combination of educational and entertainment content | |
Multimedia | A combination of text with sound, video, animation, and graphics | |
Expert system | Software that enables computers to 'think' like experts | |
Telecommute | Use computers to stay in touch with the office while working at home | |
Information superhighway | Internet system designed to provide free interactive acces to resources for humanity | |