Download is to copy data from a remote Router is a hardware connecting two
computer/internet to a local computer networks that use the same protocols,
E-Mail Electronic mail; a means of allowing transfer of data between them
exchanging messages, which may include Telnet is a program that allows users to
enclosed files and graphics, depending on login to other computers on the Internet via
the sophistication of the system. TCP/IP
File Transfer Protocol; a mechanism for Upload is to send data from a local
transferring files across a network computer to a remote computer/internet
Firewall is a combination of software and URL or Uniform Resource Locator, are the
hardware that limits access to a WWW site web browser addresses of internet pages
and provides a degree of security. and files.
HTML : Hypertext Markup Language is Web browser is a free software package
the programmatic language that web pages that lets you view web pages, graphics, and
are based on. most online content.
http is a technical acronym that means WWW or World Wide Web or "Web" for
"hypertext transfer protocol", the language short, is the most popular portion of the
of web pages. Internet.
https is "hypertext transfer protocol XML is eXtensible Markup Language, a
secured. cousin to HTML.
IP Address is the number or name of the
computer from which you send and receive
information on the Internet.
COMPUTER SECURITY
It refers to techniques for ensuring that data stored in a computer cannot be read or compromised
by any individuals without authorization.
Most computer security measures involve data encryption and passwords.
Data encryption is the translation of data into a form that is unintelligible without a deciphering
mechanism.
A password is a secret word or phrase that gives a user access to a particular program or system.
Computer Virus Computer Anti-Virus
A computer virus is a malware program that, It is a software that designed to detect and
when executed, replicates by inserting copies of destroy computer viruses. e.g. Kaspersky,
itself (possibly modified) into other computer McAfee, Norton and AVG, etc.
programs, data files, or the boot sector of the
hard drive; when this replication succeeds, the
affected areas are then said to be "infected".
688