CGS 2060 - Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

most popular lossy image compression format

JPG

collection of ocmputers connected in small geographic area such as an office, college campus, or in your home

LANethernet

reduces audio files sampling rate to save space, lossy compression format

MP4

standard for wireless network privacy and protection is known as

WPA2

this group determines stands for WWW

WWW consortium

ARPA

advanced research projects agency

connects devices within a network

switch

device in a network that keeps track of connected devices' MAC addresses and is usually incorporated in a router

switch

cell tower's base transmission is connected to a mobile ____ station

switching

collection of related records

table

Transmission media can be wired or wireless

true

sage developed by

u.s. department of defense

URL

uniform resource locater

satellite internet service

uses microwaves to deliver service provides broadband service virtually anywhere customers usually purchase data plan that limits uploading and downloading

DSL internet service

uses telephone wires as transmission sires internet signals very consistent

original wireless network privacy standard for wifi

wep

data definition tells users how each unit of data is definined in the database which elements will be used to describe the data

what field name will data fall under what data type will be included

destructive program that replicates itself throughout a single computer or across a network

worm

wireless network privacy stand introduced in 2003, but was quickly replaced

wpa

lossless compression format

zip

type of malware that is triggered each time you boot your computer

rootkit

software programs that hide in the operating system and allow for installation of hidden files

rootkits

device that connects two networks

router

amateur computer hackers with little programming expertise that gain access to computer systems using programs tht others have written

script kiddies

small computer within phones enhances the sound quality of call is called a digital _____ processor

signal

software code of a particular computer virus is called the virus'

signature

computer controlled by a hacker

zombie

most popular network media standard for

LAN

www created thru collab with

Tim Burners-Lee

in order to change sound waves into digital signals, phones contain ______ digital converter

analog

capacity of particular transmission medium is called

bandwidth

internet signal that has enough bandwidth to allow multiple computers to be conected to the same router

broadband

dual band routers

can transmit wifi signals in 2.4GHz can transmit wifi signals in 5.0GHz minimizes impact of interference from microwaves and car alarms

computer that requests resources such as a webpage, spreadsheet, image file, or services from another ocmputer on a network

client

large databases often called data banks, that cover particular subjects are referred to as

commercial databases

select characteristics of a router

connect networks provides hardware firewall protection usually incorporates a switch

router

connects 2 networks

phishing scam

contact institution message was allegedly sent from contact US-CERT

launch attacks against computer systems for political or ideological reaosns

cyberterrorism

DMBS subsystem that allows for data recovery, support, and maintaining and securing the data base

data administration

an integral part of DBMS is data definition subsection. this subsection uses a data scheme:

data dictionary

DDoS

distributed denial of service

TLD refers to highest level in

domain name hierarchy

cable internet speeds are ________ than DSL

faster

transmission media with largest bandwidth

fiberoptic

a group of rleated characters in a database table that represent a characterstic of something or someone

field

protocol commonly used to transfer large files from one server to another on the internet is hte

file transfer protocol

legacy (outdated) lossless format

gif

letting computer users drag images and documents across monitors made the ______ user interface very popular

graphical

category of cyberterrorism that focuses on hacking computer systems for politically or socially motived purposes

hacktivism

functions of mobile switching station

- assigns frequencies to your calls - sends your call to the receiver's MSS - changes the cell and base station your transmission go through as you travel

most cell phones come with approx. ______ of RAM

500 MB- 2GB

IP addresses are assigned by ICANN

internet corporation for assigned names and numbers

andriod operating system

ios9

telephone wire has _____ bandwidth than television cable

less

DBMS provides an interface for the end of user database

logical

reduces space required by reducing redundancy within files

lossless

reduces space required by removing less valuable data

lossy

a switch distinguishes between various devices within a network by their _______ addresses

mac

network interface card that contains a unique ________ address, allowing the switch to identify it

mac

virus written in macro language and placed within a document or spreadsheet is called

macrovirus

experts suggest using password ______ software to keep your passwords safe

management

DBMS subsystem that provides for data maintenance, analysis, and generation of reports

manipulation

doman name

mheducation.com

windows 10 replaced internet explorer with more secure browser

microsoft edge

tablet with 16 GB of RAM and 1 TB of starage

microsoft surface pro 4

converts analog signals into digital signals, and digital signals into analog signals

modem

modem

modulater-demodulater

a complex database that organizes and stores info in . cube format and has measured attributes and featured attibutes

multidimensional database

fake webpage to trick victims into divulging personal info

pharming

apps such as itunes or quicktime, called audio

players

software that can be added to increase its functionality

plug-ins

most popular lossless image compression format

png

in a relational database, an important field that contains a unique value that identifies each record as individual

primary key

to search a database create a

query

wifi waves are

radio waves

collection of related fields in a data file

record

data sheet view of a relational database a row of information is called

record

data sheet view of relational dtabases a row of in fo is called

record

link between tables in telational database that defines how the data is related

relationship

two major conecerns with cloud storage

reliability security

true regarding IP addresses

- stand for internet protocol -in most home networks IP addresses are assigned by the internet service provide - two laptops connect to same network, share IP addresses

rootkits allow remote users to

-delete files -intall rogue files -create backdoors

fiber optic lines

-made of one or thousands of fibers -high-speed transmission

techniques that are used to minimize the risk of harmful intrusions into computer or network

-proxy servers -packet filters

select the reasons for compressing a file

-reduce bandwidth need to transmit -reduce storage space requirements

antivirus programs use a variety of techniques to identify and remove viruses and malware

-signature based detection -heuristic based detection

commonly used for drawings

.gif

common video file formats

.mov .avi

common words for processing file extensions

.odf .docx

common image formats

.png .jpg

a smart phone emits approx. _______ watts of microwaves

0-1

2 folders open on your desktop and you want to copy a file from one folder to another, hold down ________ and drag the file

CTRL

an attack on a network designed to interrupt or stop network traffic by flooding it with too many requests

DDoS

IP addresses are structured and assigned by a service called _______ or by a network administrator

DHCP

broadband is measured in

Mbps

technology tht provides a type of firewall protection by hiding internal IP addresses

NAT

signal transmitted every few seconds by wireless router so that computer can find wifi hotspot

SSID

refers to distribution of computer applications over the internet and is commonly referred to as web apps

SaaS

for a network to connect to the internet it must use the _____ suite of protocols

TCP/IP


Conjuntos de estudio relacionados

Chapter 2: Network Standards (Test)

View Set

Personal Finance Final Study Guide Part 1

View Set

Peptide Bonds Chapter 4 - Part 1

View Set

BSCI 2101 Exam 2 Review (Muscles, Elderly Hip Fractures, Muscle Contraction, ACL Tears Sex Differences)

View Set