Mock+Exam+P3+Key+Terms

Contribute a unique detail to each key term below. < Back to Mock P3 Collaborative Page toc

Antenna
An antenna (or aerial) is a transducer designed to transmit or receive electromagnetic waves. 1263985268

Antennas convert electromagnetic waves into electrical currents. Antennas are used in systems such as radio and television broadcasting, point-to-point radio communication, wireless LAN, cell phones, radar, and spacecraft communication. 1264308476

There are many different types of antennas. There is the; Bogus Antenna, the Dipole Antenna, Twin Lead Antennas, Rabbit Ears Antenna, the Dish Clip Antenna, the Turnstile, the other Omni, the Yagi, the typical TV-FM VHF Antenna, the typical UHF Antenna, the atypical Low Channel UHF, and the typical All Band Home Antenna. user:annapettersen

An electrical device that sends or receives radio or television signals. 1264482538

Bluetooth
Bluetooth is an open wireless protocol for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks.1263985427

One of the advantages of Bluetooth is that it can connect several devices, overcoming problems of synchronization. Furthermore Bluetooth is a standard and a communications protocol primarily designed for low power consumption 1264308476

Radio technology that connects electronic devices without using a cable.1264482842

The frequent use of Bluetooth, has resulted in the development of separate ‘Bluetooth Vocabulary’. Examples of this vocabulary includes; ‘BlueBug’ – Issuing AT commands to place calls using another Bluetooth device, ‘BlueRouge’ – Using unauthorized Bluetooth devices via Access Points, ‘BlueSniffing’ – Scanning an address range to find a nearby Bluetooth device, and ‘BlueSpoof’ – Masquerading as another Bluetooth device by using its BT address. user:annapettersen

Cell Phone/Mobile Phone
A mobile phone or mobile (also called cellphone and hand phone) is an electronic device used for mobile telecommunications (mobile telephony, text messaging or data transmission) over a cellular network of specialized base stations known as cell sites. 1263985713

Mobile phones have many different services and accessories in addition to the standard voice function. Examples can be SMS for text messaging, email, packet switching for access to the Internet, gaming, Bluetooth, infrared, camera with video recorder and MMS for sending and receiving photos and video, MP3 Player, radio and GPS. 1264308476

user:annapettersen

DHCP
The **Dynamic Host Configuration Protocol** (**DHCP**) is a computer network protocol used by hosts (//DHCP clients//) to retrieve IP address assignments and other configuration information, and uses a client-server architecture. 1264308476

Hotspot
A **hotspot** is a site that offers Internet access for users by the use of a wireless LAN. A router is connected to a link to an Internet service provider. The Hotspots are typically placed in public areas, such as coffee shops and they typically use Wi-Fi technology for the wireless network. 1264308476

HTTPS

 * Hypertext Transfer Protocol Secure** (**HTTPS**) combines the Hypertext Transfer Protocol with the SSL/TLS protocol in order to provide encryption and secure identification of the server. The HTTPS connections are often used for payment transactions on the WWW and for other sensitive transactions in corporate information systems. 1264308476

IP Address
IP Address is short for Internet Protocol address, and is a numerical label, which is assigned to devices that participates in a computer network that uses the IP for communication. The two main function of an IP address is to host or network interface identification and location addressing. 1264308476

ISP
An **Internet service provider** (**ISP**) is a company that offers its customers access to the Internet through different connections such as dial-up, DSL, broadband wireless, cable modem, fiber and ISDN. 1264308476

MAC Address
A **Media Access Control address** (MAC address) is a unique identifier assigned to most network interface cards by the manufacturer for identification. The following link shows how to find a MAC address: [] 1264308476

"A MAC address (also called an Ethernet address or an IEEE MAC address) is a number (typically written as twelve hexadecimal digits, 0 through 9 and A through F, or as six hexadecimal numbers separated by periods or colons, i.e. 0080002012ef, 0:80:0:2:20:ef) which uniquely identifes a computer that has an Ethernet interface. Unlike the IP number, it includes no indication of where your computer is located. In DHCP's typical use, the server uses a requesting computer's MAC address to uniquely identify it." ([]) user:annapettersen

Modem
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio. 1263985713

The most familiar modem is a voiceband modem that turns the binary digits, 1s and 0s of a personal computer into sounds that can be transmitted over the telephones lines. Once received on the other side, converts those 1s and 0s back into a form used by a USB, Ethernet, serial, or network connection. Modems are generally classified by the amount of data they can send in a given time, normally measured in bits per second. 1264308476

Router
A router is an electronic device used to connect two or more computers or other electronic devices to each other, and usually to the Internet, by wire or radio signals. This allows several computers to communicate with each other and to the Internet at the same time. 1263986039 1263986039 Routers operate in two different planes: Control plane, in which the router learns the outgoing interface that is most appropriate for forwarding specific packets to specific destinations, and the second plane is the Forwarding planes, which is responsible for the actual process of sending a packet received on a logical interface to an outbound logical interface.

1264308476

Spam/Spyware Protection
Anti-spyware programs can combat spyware in two ways. First they can provide real time protection against the installation of spyware software on your computer. This type of spyware protection works the same way as that of anti-virus protection in that the anti-spyware software scans all incoming network data for spyware software and blocks any threats it comes across. The other way is anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer. This type of spyware protection is normally much easier to use and more popular. Example of a Microsoft AntiSpyware Alert: 1264308476

SSID
1264308476
 * Service Set Identifier** (SSID), is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other.

Switch

 * A network switch** is a computer networking device that connects network secments. The term commonly refers to a network bridge that processes and routes data. 1264308476

USB Hub
A USB hub is a device that allows many USB devices to be connected to a single USB port on a host computer or another hub.1263986039

Example of external USB hub: 1264308476

Web Conferencing Environment
Web conferencing is a form of real-time communication in which multiple computer users, all connected to the Internet, see the same screen at all times in their Web browsers. Some Web conferencing systems include features such as texting, voice over IP (VoIP) and full-motion video. 1264308476

Virtual Learning Environment (VLE)
A **virtual learning environment (VLE)**: software system designed to support teaching and learning in an educational setting. The VLEs will normally work over the Internet and provide a collection of tools such as those for assessment, communication, uploading of content, return of students' work, peer assessment, administration of student groups, collecting and organizing student grades, questionnaires, tracking tools, etc. New features in these systems include wikis, blogs, RSS and 3D virtual learning spaces. 1264308476

Examples of VLE software are BlackBoard, CyberExtension, WebTrain etc 1264480503

Virus Protection
1264308476
 * Antivirus** (or **anti-virus**) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses.

WiFi
1264308476
 * Wi-Fi** The Wi-Fi Alliance is a global, non-profit association of companies that promotes WLAN technology and certifies products if they conform to certain standards of interoperability. A Wi-Fi enabled device such as a PC, video game console, mobile phone, MP3 player etc. can connect to the Internet when within range of a wireless network connected to the Internet. In addition to private use in homes and offices, Wi-Fi can provide public access at Wi-Fi Hotspots provided either free of charge or to subscribers to various commercial services.

1264480182

Wi-Max
1264308476
 * WiMAX**, short for //**Worldwide Interoperability for Microwave Access**//, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes, from points to multipoint links to portable and fully mobile internet access.

WEP/WPA/WPA2
1264308476
 * Wi-Fi Protected Access** (**WPA** and **WPA2**) a certification program created by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. This protocol was created in response to several serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy)