Network Chico Computer
terms glossary
Some definitions from the Sharpened Glossary
| 0-9 | A
| B | C | D
| E | F | G | H | I
| J | K | L
| M | N | O
| P | Q | R
| S | T | U
| V | W | X
| Y | Z |
If you would like to have a term added to the Network
Chico computer terms glossary please contact
Network Chico today with
your suggestion. Your feedback
is important to Network Chico.
=E=
E-commerce: E-commerce
(electronic-commerce) refers to business over the Internet. Web
sites such as Amazon.com, Buy.com, and eBay are all e-commerce
sites. The two major forms of e-commerce are Business-to-Consumer
(B2C) and Business-to-Business (B2B). While companies like Amazon.com
cater mostly to consumers, other companies provide goods and
services exclusively to other businesses. The terms "e-business"
and "e-tailing" are often used synonymously with e-commerce.
eDirectory: Formerly known
as Novell Directory Services or NDS, eDirectory
is a directory service software product first released in 1996
by Novell for centrally managing access to resources on multiple
servers and computers within a given network. See also
LUM.
EIA: "Electronic
Industries Alliance" An industry trade group of electronics
and networking manufacturers that collaborates on standards for
wiring, connectors and other common components.
EISA: "Extended Industry
Standard Architecture" A 32-bit PC bus architecture that
is backward-compatible with the older, slower 16-bit ISA bus
architecture.
Electronic eavesdropping:
The ability to "listen" to signals passing through
some communications medium by detecting its emissions. Eavesdropping
on many wireless networking technologies is especially easy because
they broadcast their data into the atmosphere.
E-mail: Ranking up there
with the web as one of the most useful features of the Internet,
e-mail (electronic-mail) has become one of today's standard means
of communication. Billions of messages are sent each year. If
you're like most people these days you probably have more than
one e-mail address. E-mail is part of the standard TCP/IP set
of protocols. Sending messages is typically done by SMTP (Simple
Mail Transfer Protocol) and receiving messages is handled by
POP3 (Post Office Protocol 3) or IMAP (Internet Message Access
Protocol). IMAP is the newer protocol, allowing you to view and
sort messages on the mail server, without downloading them to
your hard drive. Though e-mail was originally developed for sending
simple text messages it has become more robust in the last few
years. Now HTML-based e-mail can use the same code as web pages
to incorporate formatted text, colors, and images into the message.
Also, documents can be attached to e-mail messages, allowing
files to be transferred via the e-mail protocol. However, since
e-mail was not originally designed to handle large file transfers,
transferring large documents (over 3 MB, for example) is not
allowed by most mail servers.
EMI: "Electromagnetic
Interference" A form of electrical interference caused by
emissions from external devices, such as transformers or electrical
motors, that can disrupt network transmissions over an electrical
medium.
Emoticon: These are the
little text-based faces and objects that you often see in e-mail
and online chat. They help give the reader a sense of the writer's
feelings behind the text. For example, the classic =) face shows
that the writer is happy about something or that his message
in good humor. The =P face is used to show frustration or to
say "Whatever..." Emoticons can also be used to create
real-world objects. For example, a @-->-->--- is supposed
to be a long-stemmed rose, which you can use to show affection.
Encryption: This is the
coding or scrambling of information so that it can only be decoded
and read by someone who has the correct decoding key. Encryption
is used in secure web sites as well as other mediums of data
transfer. If a third party were to intercept the information
you sent via an encrypted connection, they would not be able
to read it. So if you are sending a message over the office network
to your co-worker about how much you hate your job, your boss,
and the whole company, it would be a good idea to make sure that
you send it over an encrypted connection.
Enterprise network: A
large-scale network usually connecting many LANs and often of
a commercial nature.
Error handling: The process
of recognizing and responding to network transmission or reception
errors. These errors are usually interminable delivery (time-out),
incorrect delivery (data fails an integrity check) or lost information
(data frames or PDUs needed to reassemble a higher-level PDU
never show up and must be retransmitted).
Ethernet: A networking
technology developed in the early 1970s and governed by the IEEE
802.3 specification. Ethernet is the most
common type of connection computers use in a local area network
(LAN). An Ethernet port looks much like a regular phone jack,
but it is slightly wider. This port can be used to connect your
computer to another computer, a local network, or an external
DSL or cable modem. Ethernet cables use an RJ-45 connector. Two
widely-used forms of Ethernet are 10BaseT and 100BaseT. In a
10BaseT Ethernet connection, data transfer speeds can reach 10
Mbps (megabits per second) through a copper cable. In a 100BaseT
Ethernet connection, transfer speeds can get up to 100 mbps.
There is also a new technology called "Gigabit" Ethernet,
where data transfer rates peak at 1000 Mbps.
Ethernet 802.2: Ethernet
frame type generally used by IPX/SPX on Novell NetWare 3.12 and
4.x networks.
Ethernet 802.3: Ethernet
frame type generally used by IPX/SPX on Novell NetWare 2.x and
3.x networks.
Ethernet II: Ethernet
frame type used by TCP/IP.
Ethernet raw: Ethernet
frame type, also called Ethernet 802.3
Ethernet SNAP: Ethernet
frame type used in Apple's EtherTalk environment.
EtherTalk: The standard
for sending AppleTalk over Ethernet cabling.
Event Viewer: A Windows
NT and Windows 2000 tool that records events in three logs based
on type of event: security, system and application.
Exchange Server: A BackOffice
component from Microsoft that acts as an e-mail server.
Extended LAN: The result
of certain wireless bridges' ability to expand the span of a
LAN as far as three to 25 miles. Microsoft calls the resulting
networks "extended LANs."
Extent: The size of an
area; usually describes the upper limit of a memory region on
a PC named by a base address that indicates the starting point
(upper bound = base address + extent).
Network Chico Computer
terms glossary
| 0-9 | A
| B | C | D
| E | F | G | H | I
| J | K | L
| M | N | O
| P | Q | R
| S | T | U
| V | W | X
| Y | Z |
Top of page
|