Star Ring Topology Star Topology: In Star Ring or star topologies, nodes radiate from a hub. The hub or concentrator is different depending on the technology used Ethernet, FDDI, etc. The biggest advantage of this topology is that if one node fails, the network continues to function.
Switch or bridge:A network device capable of performing a number of administration tasks, including data redirection.
SDRAM:very fast, high capacity memory for servers and workstations.
Semiconductor:This is the name given to insulating substances, such as germanium and silicon, which become conductors by the addition of certain impurities. Semiconductors are of enormous importance in electronics.
Serial: method of transmitting data sequentially, that is, bit by bit.
Scan Disk: Windows program that checks a disk, detects errors and corrects them.
0610 Service: which allows Argentine users to connect to the Internet at a lower cost than normal rates, putting the prefix 0610 before the telephone number of their provider.
Server: central computer of a network system that provides services and programs to other connected computers. System that provides resources (for example, file servers, name servers). On the Internet, this term is used very often to designate those systems that provide information to network users.
Shareware: software distributed on a trial basis. After a certain time of use (generally 30 days) the user has the option to buy it.
Slot:motherboard slot that allows you to expand the capacity of a computer by inserting plates.
SMS:Short Message Service. Messaging service for cell phones. Allows you to send a message of up to 160 characters to a cell phone. This service was initially enabled in Europe. There are several websites from which you can send an SMS.
SMTP:Simple Mail Transfer Protocol. It is a standard protocol for sending e-mail.
SNA: System Network Architecture: network architecture for mainframes, developed by IBM.
Sniffer: program that monitors and analyzes network traffic to detect problems or bottlenecks. Its objective is to maintain the efficiency of data traffic. But it can also be used illegitimately to capture data on a network.
Software: general term that designates the diverse types of programs used in computing.
Spam: unsolicited email. It is considered unethical, as the recipient pays to be connected to the Internet.
Socket: (bracket) electrical connector, socket, plug. A socket is the end point of a connection. A method of communication between a client program and a server program on a network.
SQL:Structured Query Language. Programming language used to retrieve and update the information contained in a database. It was developed in the 70s by IBM. It has become an ISO and ANSI standard.
SSL: Secure Sockets Layer. Protocol designed by the Netscape company to provide encrypted communications on the Internet.
Submit: Send. Adaptation of the English verb «Submit» to Spanish. It is often used in web application development when it comes to "submitting", that is, submitting data from a form through HTML.
Flat rate: service modality offered by Internet providers. It consists of paying a fixed amount to access the Internet without a time limit.
Network card: Piece of hardware responsible for communicating the computer with other computers.
Tgraphic card: Piece of hardware in charge of generating the video image that we see on the monitor.
TCP / IP:Transfer Control Protocol / Internet Protocol. It is the set of TCP and IP protocols used on the Internet.
token ring (ring network): A ring network is a type of LAN with nodes wired in a ring. Each node constantly passes a control message (token) to the next, so that any node that has a "token" can send a message.
Topology: The "shape" of the network. Three types of technologies predominate: Bus, [[Star network topology | Star and Ring.
Transcend Networking: 3Com technologies for building large corporate networks. It consists of three main elements, scalable performance, extensible reach, and growth management.
Transistor: Electronic component that marks a before and after in the history of electronics and computing. In layman's terms it is something like an 'adjustable electronic tap'.
Trojan (Trojan horse; Trojan horse): program that a computer receives, covertly, which appears to be harmless and whose object is usually to capture passwords and keystrokes to allow the subsequent attack of the machine.
Tux:Mascot penguin of the GNU / Linux operating system.
Unix:Multi-user and multi-tasking operating system, it was very important in the development of the Internet, today improved versions of it are still being used, such as Linux, BSD, Solaris or AIX.
USB (Universal Serial Bus): it is a plug & play interface between a computer and certain devices, for example, keyboards, telephones, scanners and printers. Wikipedia
The content of the article adheres to our principles of editorial ethics. To report an error click here!.