hassanmalida+network+vocab


 * **Cycle** || **Word** || **Definition** ||
 * 9 || **Bit rate** || In telecommunications and computing, bit rate (sometimes written bitrate, data rate or as a variable //R//) is the number of bits that are conveyed or processed per unit of time. ||
 * 9 || **Phishing** || is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication ||
 * 9 || **Protocols** || In object-oriented programming, a protocol or interface is a common means for unrelated objects to communicate with each other. These are definitions of methods and values which the objects agree upon in order to cooperate. ||
 * 10 || **Remote access** || Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN. ||
 * 10 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Teleconfrencing** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">A **teleconference** or **teleseminar** is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunications system. ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">10 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Pharming** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Pharming** is a hacker's attack aiming to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real addresses ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">11 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**WiMax** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">(**Worldwide Interoperability for Microwave Access**) is a communication technology for wirelessly delivering high-speed Internet service to large geographical areas. ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">11 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Bluetooth** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">11 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Extranet** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">A computer network that allows controlled access from the outside, for specific business or educational purposes ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">12 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Spybot** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">is a popular spyware and adware removal program compatible with Microsoft Windows 95 and later. It scans the computer hard disk and/or RAM for malicious software ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">12 || **<span style="color: black; font-family: Arial,Helvetica,sans-serif; font-size: 16px;">RAID ** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">is a storage technology that combines multiple disk drive components into a logical unit. Data is distributed across the drives in one of several ways called "RAID levels", depending on what level of redundancy and performance (via parallel communication) is required. ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">12 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**encryption** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">13 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**Spam filters** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">Tools found in most email programs whose purpose is to limit or control junk mail. ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">13 || **<span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">spyware ** || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">tecchnology that collects information from computer users without their consent ||
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">13 || <span style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">**spoofing** || <span class="st" style="font-family: Arial,Helvetica,sans-serif; font-size: 16px;">E-mail //spoofing// is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. ||

__<span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">cloud computing Key words __
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">In house IT infrastructure
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">PC based service
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">optimal performance
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">bullet-proof cloud bases systems
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">comercial cloud computing systems
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">CIO
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">I cloud
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">enterprise data center
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">security breaches
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">hybrid life
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">remote server network
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">Hosted service
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">Flow chart
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">marketing tool
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">jive software
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">socia; systems
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">Kinect
 * <span style="font-family: Arial,Helvetica,sans-serif; font-size: 20px;">Windows 8