expand for answer

Concentrator

A computer that consolidates the signals from any slower speed transmission lines into a single, faster line or performs the reverse function. See repeater.


Similar items:
The term “computer forensics” was coined in 1991 in the first training session held by the International Association of Computer Specialists (IACIS) in Portland, Oregon. Since then, computer forensics has become a popular topic in computer security circles and in the legal community. Like any other forensic science, computer forensics deals with the application of law to a science. In this case, the science involved is computer science and some refer to it as Forensic Computer Science. Computer forensics has also been described as the autopsy of a computer hard disk drive because specialized software tools and techniques are required to analyze the various levels at which computer data is stored after the fact. Computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector, but it has been the mainstay of technologyrelated investigations and intelligence gathering in law enforcement and military agencies since the mid1980s. Like any other forensic science, computer forensics involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Typically, computer forensic tools exist in the form of computer software.
[view]
A technique that maximizes processing speed through the temporary use of highspeed storage devices. Input files are transferred from slower, permanent storage and queued in the highspeed devices to await processing, or output files are queued in highspeed devices to await transfer to slower storage devices.
[view]
A communication medium that supports only a single communication signal at a time. A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilize a transceiver. In baseband, the entire bandwidth of the transmission medium (cable) is utilized for a single channel. It uses a single carrier
[view]
Computer evidence is a copy of a document stored in a computer file that is identical to the original. The legal “best evidence” rules change when it comes to the processing of computer evidence. Another unique aspect of computer evidence is the potential for unauthorized copies to be made of important computer files without leaving behind a trace that the copy was made. This situation creates problems concerning the investigation of the theft of trade secrets (e. g. , client lists, research materials, computeraided design files, formulas, and proprietary software).
[view]
A form of auditing focused on communications. Transmission logging records the details about source, destination, time stamps, identification codes, transmission status, number of packets, size of message, and so on.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in