|
|
See User Datagram Protocol.
A URL is one way of identifying a document on the Internet. It consists of the protocol that is used to access the document and the domain name or IP address of the host that holds the document; for example, http://www.sybex.com.
A device that can provide short-term power, usually by using batteries.
The most common networking cable currently in use.
The amount of time a particular computer or network component has been functional.
See Uniform Resource Locator.
Defined policies governing computer usage.
The person who is using a computer or network.
The protocol at the Host-to-Host layer of the DoD model, which corresponds to the Transport layer of the OSI model. Packets are divided into segments, given numbers, sent randomly, and put back together at the receiving end. This is a connectionless protocol. See also connectionless transport protocol, Open Systems Interconnect.
A type of network in which user accounts can read, write, change, and take ownership of files. Rights are assigned to user accounts, and each user knows only his or her own username and password— which makes this the preferred method for securing files.
Defined policies that detail user management.
|
|