network administrator

  • 101Outline of information technology — See also: Index of information theory articles The following outline is provided as an overview of and topical guide to information technology: Information technology (IT) – defined by the Information Technology Association of America (ITAA) as… …

    Wikipedia

  • 102AMA Computer University — Infobox University name = motto = Never rest on one s laurels established = October 15, 1980 type = Private president = Amable Aguiluz IX city = Quezon City state = Metro Manila country = Philippines address = Villa Arca, Project 8 undergrad =… …

    Wikipedia

  • 103Metro Ethernet — A Metro Ethernet is a computer network that covers a metropolitan area and that is based on the Ethernet standard. It is commonly used as a metropolitan access network to connect subscribers and businesses to a larger service network or the… …

    Wikipedia

  • 104Thames Valley College (London, Ontario, Canada) — Thames Valley College of Business IT, also known as Information Technology Business College Inc., is a private career college in London, Ontario, Canada. It reportedly opened in 2003 and is accredited by the Ministry of Training, Colleges and… …

    Wikipedia

  • 105IPv6 address — An Internet Protocol Version 6 address (IPv6 address) is a numerical label that is used to identify a network interface of a computer or other network node participating in an IPv6 enabled computer network. IP addresses serve the purpose of… …

    Wikipedia

  • 106Routing — This article is about routing in networks. For other uses, see Routing (disambiguation). Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the… …

    Wikipedia

  • 107Wake-on-LAN — (WOL) is an Ethernet computer networking standard that allows a computer to be turned on or woken up by a network message. The message is usually sent by a program executed on another computer on the same local area network. It is also possible… …

    Wikipedia

  • 108Piggybacking (internet access) — Piggybacking is a term used to refer to access of a wireless internet connection by bringing one s own computer within the range of another s wireless connection, and using that service without the subscriber s explicit permission or knowledge.… …

    Wikipedia

  • 109Honeypot (computing) — In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a… …

    Wikipedia

  • 110File Service Protocol — (FSP) is a UDP based replacement for the File Transfer Protocol, designed for anonymous access with lower hardware and network requirements than FTP. In particular, because it uses UDP, it avoids the problems that many FTP servers have had with… …

    Wikipedia