Techinical Definitions

You might also like

Download as odt, pdf, or txt
Download as odt, pdf, or txt
You are on page 1of 4

Firewall: A firewall is a security barrier, either hardware or software, used to protect a network or computer

system from unauthorized threats and attacks. It controls network traffic and decides which data can enter or
exit a network or device.

Antivirus: Antivirus is a program designed to detect, prevent, and remove malicious software, such as
viruses, worms, and trojans, which can harm or compromise the security of a computer system.

Safety warnings: Safety warnings refer to notifications or messages that alert users about potential dangers
or risks in a system or environment.

Symptom Collection: Symptom collection refers to the process of gathering information about symptoms or
issues experienced in a system or device for later diagnosis and resolution.

Problem Isolation (Close Questions): Problem isolation involves identifying and narrowing down the cause of
a problem or failure in a system. "Close questions" refer to questions with limited answer options.

Corrective measures: Corrective measures are actions taken to resolve a problem or anomaly in a system or
process to restore its normal operation.

Setting: Setting refers to the configuration or adjustment of parameters in a system or device to tailor it to
specific preferences or requirements.

Public Network: A public network is a communication network that is available for public access, such as the
internet. It is accessible to any user without significant restrictions.

Network Configuration: Network configuration refers to the arrangement and settings of a computer
network, including the allocation of IP addresses, routing, and other parameters.

Active hotspot: An active hotspot is a location or device that provides wireless internet (Wi-Fi) access and is
currently in operation.
DNS (Domain Name Servers): Domain Name Servers are internet servers that translate human-readable
domain names into IP addresses that computers use to identify and locate services on the network.

PING (Disk operating system prompt command): The "ping" command is used in operating systems to check
network connectivity and latency between two devices by sending data packets and receiving responses.

Console (referred to as a computer console): A computer console refers to a terminal or text screen used to
interact with a system or program through text commands.

Bandwidth: Bandwidth refers to a network connection's capacity to carry data over a given period of time. It
is measured in bits per second (bps) and affects data transfer speed.

Upload Rate: Upload rate refers to the speed at which data can be sent from a device to a network. It is
measured in bits per second.

Download Speed: Download speed refers to the speed at which data can be received from a network on a
device. It is also measured in bits per second.

VoIP (Voice over Internet Protocol): VoIP is a technology that allows the transmission of voice and
multimedia over the internet and data networks instead of traditional telephone lines.

VPN (Virtual Private Network): A VPN is a secure network that uses a public connection, such as the
internet, to securely and encryptedly connect devices. It is used to protect online communications' privacy and
security.

Vulnerabilities: Vulnerabilities are weaknesses or flaws in computer systems that can be exploited by
malicious actors to compromise security.

Network Printer: A network printer is a printer that connects to a network rather than an individual
computer, allowing multiple users to print documents over the network.
Shared Files: Shared files are documents or data that multiple users have access to on a network for
collaboration or information sharing.

Host: A host is a device or system connected to a network that provides services, resources, or data to other
devices on the network.

Subnetwork: A subnet is a division of a computer network into smaller segments, allowing for more efficient
management and administration.

OSI Model (Open Systems Interconnection Model): The OSI model is a reference framework that defines
how applications in a network communicate through layers of protocols, facilitating interoperability between
systems.

Diagnosis: Diagnosis refers to the process of identifying and resolving problems or diseases in a system or
process.

Server: A server is a computer or device that provides services, resources, or data to other devices on a
network. It can serve web pages, emails, files, etc.

Terminal: A terminal is a device or program that allows a user to access and communicate with a remote
computer or system through a command-line interface.

HTTP (Hypertext Transfer Protocol): HTTP is the protocol used to transmit information on the World Wide
Web. It is used to request and deliver web pages and other online resources.

HTTPS (Hypertext Transfer Protocol Secure): HTTPS is a secure version of HTTP that uses encryption to
protect the privacy and security of online communications.

DHCP (Dynamic Host Configuration Protocol): DHCP is a protocol used to automatically assign IP addresses
and network configuration to devices on a network.
WiMAX (Worldwide Interoperability for Microwave Access): WiMAX is a broadband wireless
communication technology that provides high-speed internet access.

Bluetooth: Bluetooth is a wireless communication technology that enables data transfer and device
connection over short distances.

Browser: A web browser is an application that allows users to access and navigate web pages on the
internet.

Plug-In: A plug-in, or plugin, is additional software that can be integrated into an existing software program
to provide extra functionality or features.

You might also like