The document defines 40 common computer networking and operating system terms, including hardware components like CPU, RAM and network cards. It also explains software concepts such as operating systems, shells, databases, protocols, and network addressing. Terms cover local area networks, wide area networks, servers, switches, routers and more that comprise computer systems and allow them to communicate over networks.
The document defines 40 common computer networking and operating system terms, including hardware components like CPU, RAM and network cards. It also explains software concepts such as operating systems, shells, databases, protocols, and network addressing. Terms cover local area networks, wide area networks, servers, switches, routers and more that comprise computer systems and allow them to communicate over networks.
The document defines 40 common computer networking and operating system terms, including hardware components like CPU, RAM and network cards. It also explains software concepts such as operating systems, shells, databases, protocols, and network addressing. Terms cover local area networks, wide area networks, servers, switches, routers and more that comprise computer systems and allow them to communicate over networks.
1) LAPTOP: A portable microcomputer small enough to rest on the lap.
2) OPERATING SYSTEM: The collection of software that directs a computer's operations, controlling and scheduling the execution of other programs, and managing storage, input/output, and communication resources. 3) SHELL: Command interpreter. 4) MULTI- USER SYSTEM: Systems that can serve multiple users, either through several terminals connected to the computer or through remote sessions in a communications network. 5) MULTI-TASK: A single user running multiple tasks at the same time on a system. 6) KERNEL: The central part of an operating system, on which the rest of the system rests. 7) MASK: A Mechanism created to control interruptions. 8) HARDWARE: They are all the physical components that make up a computer. 9) IP ADRESS: IP addresses are the method by which individual computers are identified. 10)API: Set of system routines that can be used in a program to manage the input-output of files, etc. 11)BIOS: the part of a computer that directs many basic functions of the system, such as booting and keyboard control. 12)DATABASE: a collection of organized, related data, esp. one in electronic form that can be gathered, analyzed, or retrieved by a computer. 13)USB: Universal Serial Bus: a standard for connection sockets on computers and other electronic equipment. 14)GATEWAY: Device that allows two networks, usually of different protocol, to be connected to each other or a server to a network. 15)HOST: Is any computer that has an IP number and that can both send and receive information over a network. 16)LAN: Group of connected computers in the same location. 17)PASSWORD: Personal secret key. 18)PROXY: Server that makes the connection to the Internet and that serves as a gateway to client computers. 19)PROGRAM: Group of instructions used to perform certain tasks. Also called applications. 20)RAM (Random Access Memory): Random Access Memory that keeps data alive until the computer is disconnected. 21)ROUTERS: Network devices whose main mission is to route the information packets they receive in the right direction to reach their destination. 22)NETWORK CARD: Hardware that is inserted into a computer to connect it to a network. 23)CPU: Housing where the main components of the computer are mounted. 24)VIRUS: Computer programs designed with malicious intent, as they become parasites capable of infecting others to include an evolved copy of themselves. 25)WAN: Public wide area network, has no physical limits. 26)LOG- IN: Identify yourself and gain access to a computer by username and password. 27)HTTP: Hypertext transfer protocol: a protocol for transferring hypertext documents, the standard protocol for the World Wide Web. 28)FIREWALL: A computer system that isolates another computer from the internet in order to prevent unauthorized access. 29)UNIX: a multiuser, multitasking computer operating system. 30)TRACERT: Command that analyzes and records the path followed by any information sent by the Network. 31)PING: Is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software. 32)DHCP: stands for dynamic host configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints. 33)LINUX: Open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices. It is supported on almost every major computer platform including x86, ARM and SPARC, making it one of the most widely supported operating systems. 34)SWITCH: Is a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). 35)MAN: Is a network that spans a large area, such as a town or city. It is larger than a campus area network (CAN), but smaller than a wide area network (WAN). 36)WINDOWS SERVER: A series of server operating systems developed by Microsoft Corporation. Windows servers are more powerful versions of their desktop operating system counterparts and are designed to more efficiently handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions. 37)UDP: The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network. Prior communications are not required in order to set up communication channels or data paths. 38)TCP: A connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP. 39)Network Address: The network address is a standard way of referring to a network. For example: the network in the figure could be referred to as "network 10.0.0.0". This is a much more convenient and descriptive way of referring to the network than using a term like "the first network". All hosts on the 10.0.0.0 network will have the same network bits. 40)Broadcast: Is an IP address that is used to target all systems on a specific subnet network instead of single hosts. In other words broadcast address allows information to be sent to all machines on a given subnet rather than to a specific machine.