AOK's Proactive Care offers increased performance, security and reliability and at an affordable price. Learn More

Whether you have a technical question or are requesting a quote, feel free to contact us at:

820 Clark Street
Oviedo, FL 32765
Phone: 407.249.1989
Fax: 407.249.1978

AOK is here to make IT easy. We speak "geek" so you don't have to but for those who want to know more, below is a collection of commonly used IT terminology.

The point or operation that has the least capacity in a system or network, where no alternative routings exist.
Transmission over coaxial or fiber-optic cables that have a wider bandwidth than conventional telephone lines, giving them the ability to carry video, voice and data simultaneously. Cable modems and digital subscriber line (DSL) technologies are examples of broadband connectivity.
Information Techology (IT)
Any equipment, interconnected system, or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information. The term information technology includes computer equipment, communications equipment, software, hardware, firmware, magnetic storage media, IT support equipment, and related resources.
IP Address (Internet Protocol Address)
A unique number assigned by an Internet authority that identifies a computer on the Internet, or on any other network that uses Internet Protocol (IP). It consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, is an IP address.
An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet.
The physical hardware used to interconnect computers and users. Infrastructure includes the transmission media, including telephone lines, cable television lines, and satellites and antennas, and also the routers, aggregators, repeaters, and other devices that control transmission paths. Infrastructure also includes the software used to send, receive, and manage the signals transmitted.
Migration (Data)
The process of transferring data between storage types, formats, or computer systems. Data migration is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. It is required when organizations or individuals change computer systems or upgrade to new systems, or when systems merge (such as when the organizations that use them undergo a merger/takeover).
A collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information.
Network Security
Refers to the practice of hardening the elements of a network to protect other devices. The protection of a computer network and its services from unauthorized modification, destruction, or disclosure.
A software fix made or distributed in a quick and expedient way — typically, via a separate piece of software that users can download and run to modify an application already installed on their computers.
Penetration Testing
A method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities.
Remote Access
The ability of a user or other entity to access an IT resource via an external network connection. Remote Access generally occurs from remote locations such as homes, hotel rooms, and off-site offices; however, it could also occur from within another organizational unit’s physical facilities, depending on the technical access method used.
A class of network controller that determines the best routing for data transmission between a transmitter (sender) and a receiver. Routers are typically software controlled and can be programmed to provide the least expensive, fastest or least busy of available routes.
The measure of a system's ability to increase or decrease in performance and cost in response to changes in application and system-processing demands. Examples would include how well a hardware system performs when the number of users is increased, how well a database withstands growing numbers of queries, or how well an operating system performs on different classes of hardware.
A software program, or the computer on which that program runs, that provides client stations with access to files and printers as shared resources to a computer network.
SMTP (Simple Mail Transfer Protocol)
A messaging protocol governing e-mail transmission in Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
A chunk of computer programming code that makes copies of itself without any conscious human intervention. A virus requires the presence of some other program to replicate itself. Typically viruses spread by attaching themselves to programs and in some cases files. Some viruses do more than simply replicate themselves, they might display messages, install other software or files, delete software of files, etc.