SlideShare a Scribd company logo
1 of 2
BCT Section 1.2 Terms
             Data Communications, Networks
1. Data              Technology that enables computers to communicate using
Communications       text, numeric, voice or video data
2. Sender            Computer that is sending the message
3. Receiver          Computer that is receiving the message
4. Channel            The media that carries the message
5. Protocol           The rules that govern the orderly transfer of the data sent
                      Computer that are connected to other computers and can
6. Network
                     share information
7. Local Area         Computers connected to each other in a relatively close
Network              location
8. Wide Area
                       LAN that is expanded to cover a wide area
Network
9. Central Processing The brains of the computer that receives its information
Unit                  from the software
10. Arithmetic/Logic
                       performs arithmetic computations and logical operations
Unit
                        Uses programming instructions, it controls the flow of
11. Control Unit      information through the processor by controlling what
                      happens inside the processor.
12. Random Access
                      Memory on the motherboard that is short term
Memory
13. Read Only
                       Memory that is long term
Memory
                        a device that controls the transfer of data from the
14. Basic Controllers
                      computer to a peripheral device and vice versa
15. Serial & Parallel
                       used to connect our peripheral devices to the computer
Ports
16. Universal Serial a new standard that supports data transfer rates of up to 12
Bus                   million bits per second.
                        a circuit board that contains electronic components that
17. Motherboard
                      contains many integral components.
                        the most popular and widely used standardized coding
18. ASCII Code
                      system
                       eight bits or combinations of ones and zeros represent a
19. Byte
                      character.
20. Megabyte           1 million bytes
Gigabyte               one billion bytes
1.2 Terms

More Related Content

Similar to 1.2 Terms

Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms06asmith
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms06samcrummett
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedVincent58
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedTerminatorV
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedVincent58
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 TernmsJean
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms02jgodsey
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternmsbjohns65
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1bjohns65
 
Bct Section 1 Terns By Dilan
Bct Section 1 Terns By DilanBct Section 1 Terns By Dilan
Bct Section 1 Terns By Dilandrivera7
 
Bct Section 1 Terns By Dilan
Bct Section 1 Terns By DilanBct Section 1 Terns By Dilan
Bct Section 1 Terns By Dilandrivera7
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1jjang97
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms06maggiequ
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1kaubin06
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms02ebonati
 
Bct Section 1.2 Terms
Bct Section 1.2 TermsBct Section 1.2 Terms
Bct Section 1.2 Termswildnhj
 
Internet requirement 2 rzi
Internet requirement 2 rziInternet requirement 2 rzi
Internet requirement 2 rziasiyel
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 

Similar to 1.2 Terms (20)

Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms Finished
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms Finished
 
Bct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms FinishedBct Section 1 2 Ternms Finished
Bct Section 1 2 Ternms Finished
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1
 
Bct Section 1 Terns By Dilan
Bct Section 1 Terns By DilanBct Section 1 Terns By Dilan
Bct Section 1 Terns By Dilan
 
Bct Section 1 Terns By Dilan
Bct Section 1 Terns By DilanBct Section 1 Terns By Dilan
Bct Section 1 Terns By Dilan
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
B C T Section 1
B C T  Section 1B C T  Section 1
B C T Section 1
 
Bct Section 1 2 Ternms
Bct Section 1 2 TernmsBct Section 1 2 Ternms
Bct Section 1 2 Ternms
 
Bct Section 1.2 Terms
Bct Section 1.2 TermsBct Section 1.2 Terms
Bct Section 1.2 Terms
 
Networks
NetworksNetworks
Networks
 
MIS Chap # 5...
MIS Chap # 5...MIS Chap # 5...
MIS Chap # 5...
 
Internet requirement 2 rzi
Internet requirement 2 rziInternet requirement 2 rzi
Internet requirement 2 rzi
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

1.2 Terms

  • 1. BCT Section 1.2 Terms Data Communications, Networks 1. Data Technology that enables computers to communicate using Communications text, numeric, voice or video data 2. Sender Computer that is sending the message 3. Receiver Computer that is receiving the message 4. Channel The media that carries the message 5. Protocol The rules that govern the orderly transfer of the data sent Computer that are connected to other computers and can 6. Network share information 7. Local Area Computers connected to each other in a relatively close Network location 8. Wide Area LAN that is expanded to cover a wide area Network 9. Central Processing The brains of the computer that receives its information Unit from the software 10. Arithmetic/Logic performs arithmetic computations and logical operations Unit Uses programming instructions, it controls the flow of 11. Control Unit information through the processor by controlling what happens inside the processor. 12. Random Access Memory on the motherboard that is short term Memory 13. Read Only Memory that is long term Memory a device that controls the transfer of data from the 14. Basic Controllers computer to a peripheral device and vice versa 15. Serial & Parallel used to connect our peripheral devices to the computer Ports 16. Universal Serial a new standard that supports data transfer rates of up to 12 Bus million bits per second. a circuit board that contains electronic components that 17. Motherboard contains many integral components. the most popular and widely used standardized coding 18. ASCII Code system eight bits or combinations of ones and zeros represent a 19. Byte character. 20. Megabyte 1 million bytes Gigabyte one billion bytes