CGS 2060 - Final
most popular lossy image compression format
JPG
collection of ocmputers connected in small geographic area such as an office, college campus, or in your home
LANethernet
reduces audio files sampling rate to save space, lossy compression format
MP4
standard for wireless network privacy and protection is known as
WPA2
this group determines stands for WWW
WWW consortium
ARPA
advanced research projects agency
connects devices within a network
switch
device in a network that keeps track of connected devices' MAC addresses and is usually incorporated in a router
switch
cell tower's base transmission is connected to a mobile ____ station
switching
collection of related records
table
Transmission media can be wired or wireless
true
sage developed by
u.s. department of defense
URL
uniform resource locater
satellite internet service
uses microwaves to deliver service provides broadband service virtually anywhere customers usually purchase data plan that limits uploading and downloading
DSL internet service
uses telephone wires as transmission sires internet signals very consistent
original wireless network privacy standard for wifi
wep
data definition tells users how each unit of data is definined in the database which elements will be used to describe the data
what field name will data fall under what data type will be included
destructive program that replicates itself throughout a single computer or across a network
worm
wireless network privacy stand introduced in 2003, but was quickly replaced
wpa
lossless compression format
zip
type of malware that is triggered each time you boot your computer
rootkit
software programs that hide in the operating system and allow for installation of hidden files
rootkits
device that connects two networks
router
amateur computer hackers with little programming expertise that gain access to computer systems using programs tht others have written
script kiddies
small computer within phones enhances the sound quality of call is called a digital _____ processor
signal
software code of a particular computer virus is called the virus'
signature
computer controlled by a hacker
zombie
most popular network media standard for
LAN
www created thru collab with
Tim Burners-Lee
in order to change sound waves into digital signals, phones contain ______ digital converter
analog
capacity of particular transmission medium is called
bandwidth
internet signal that has enough bandwidth to allow multiple computers to be conected to the same router
broadband
dual band routers
can transmit wifi signals in 2.4GHz can transmit wifi signals in 5.0GHz minimizes impact of interference from microwaves and car alarms
computer that requests resources such as a webpage, spreadsheet, image file, or services from another ocmputer on a network
client
large databases often called data banks, that cover particular subjects are referred to as
commercial databases
select characteristics of a router
connect networks provides hardware firewall protection usually incorporates a switch
router
connects 2 networks
phishing scam
contact institution message was allegedly sent from contact US-CERT
launch attacks against computer systems for political or ideological reaosns
cyberterrorism
DMBS subsystem that allows for data recovery, support, and maintaining and securing the data base
data administration
an integral part of DBMS is data definition subsection. this subsection uses a data scheme:
data dictionary
DDoS
distributed denial of service
TLD refers to highest level in
domain name hierarchy
cable internet speeds are ________ than DSL
faster
transmission media with largest bandwidth
fiberoptic
a group of rleated characters in a database table that represent a characterstic of something or someone
field
protocol commonly used to transfer large files from one server to another on the internet is hte
file transfer protocol
legacy (outdated) lossless format
gif
letting computer users drag images and documents across monitors made the ______ user interface very popular
graphical
category of cyberterrorism that focuses on hacking computer systems for politically or socially motived purposes
hacktivism
functions of mobile switching station
- assigns frequencies to your calls - sends your call to the receiver's MSS - changes the cell and base station your transmission go through as you travel
most cell phones come with approx. ______ of RAM
500 MB- 2GB
IP addresses are assigned by ICANN
internet corporation for assigned names and numbers
andriod operating system
ios9
telephone wire has _____ bandwidth than television cable
less
DBMS provides an interface for the end of user database
logical
reduces space required by reducing redundancy within files
lossless
reduces space required by removing less valuable data
lossy
a switch distinguishes between various devices within a network by their _______ addresses
mac
network interface card that contains a unique ________ address, allowing the switch to identify it
mac
virus written in macro language and placed within a document or spreadsheet is called
macrovirus
experts suggest using password ______ software to keep your passwords safe
management
DBMS subsystem that provides for data maintenance, analysis, and generation of reports
manipulation
doman name
mheducation.com
windows 10 replaced internet explorer with more secure browser
microsoft edge
tablet with 16 GB of RAM and 1 TB of starage
microsoft surface pro 4
converts analog signals into digital signals, and digital signals into analog signals
modem
modem
modulater-demodulater
a complex database that organizes and stores info in . cube format and has measured attributes and featured attibutes
multidimensional database
fake webpage to trick victims into divulging personal info
pharming
apps such as itunes or quicktime, called audio
players
software that can be added to increase its functionality
plug-ins
most popular lossless image compression format
png
in a relational database, an important field that contains a unique value that identifies each record as individual
primary key
to search a database create a
query
wifi waves are
radio waves
collection of related fields in a data file
record
data sheet view of a relational database a row of information is called
record
data sheet view of relational dtabases a row of in fo is called
record
link between tables in telational database that defines how the data is related
relationship
two major conecerns with cloud storage
reliability security
true regarding IP addresses
- stand for internet protocol -in most home networks IP addresses are assigned by the internet service provide - two laptops connect to same network, share IP addresses
rootkits allow remote users to
-delete files -intall rogue files -create backdoors
fiber optic lines
-made of one or thousands of fibers -high-speed transmission
techniques that are used to minimize the risk of harmful intrusions into computer or network
-proxy servers -packet filters
select the reasons for compressing a file
-reduce bandwidth need to transmit -reduce storage space requirements
antivirus programs use a variety of techniques to identify and remove viruses and malware
-signature based detection -heuristic based detection
commonly used for drawings
.gif
common video file formats
.mov .avi
common words for processing file extensions
.odf .docx
common image formats
.png .jpg
a smart phone emits approx. _______ watts of microwaves
0-1
2 folders open on your desktop and you want to copy a file from one folder to another, hold down ________ and drag the file
CTRL
an attack on a network designed to interrupt or stop network traffic by flooding it with too many requests
DDoS
IP addresses are structured and assigned by a service called _______ or by a network administrator
DHCP
broadband is measured in
Mbps
technology tht provides a type of firewall protection by hiding internal IP addresses
NAT
signal transmitted every few seconds by wireless router so that computer can find wifi hotspot
SSID
refers to distribution of computer applications over the internet and is commonly referred to as web apps
SaaS
for a network to connect to the internet it must use the _____ suite of protocols
TCP/IP