Final Intro to Computers

¡Supera tus tareas y exámenes ahora con Quizwiz!

network operating system

(NOS) a computer operating system that is designed primarily to support workstation, personal computer, and in some instances, older terminal that are connected on a local area network (LAN).

AUP

(acceptable use policy) a document containing an organization's policies for the ethical, secure, and appropriate use of computer resources. Common elements of this is restricting particular services (file sharing), banning inappropriate behavior, stressing the importance of security, explaining the ownership and privacy of email, storage and other resources that you have access to.

AI, robots, bots

(artificial intelligence) involves the development of intelligent systems. humanoid robots are those that are created to imitate the appearance or capabilities of humans.

B2B

(business to business) transaction is one that takes place between companies, consumers are not involved. exs. :auto repair shops can order parts form a wide range of suppliers. stockbrokers and financial institutions can buy stocks and other commodities.

B2C

(business to consumer) online shopping is the process of buying a product or service through a website. ex. amazon. whenever you are ready to purchase an item, you place it inside an electronic "shopping cart" before proceeded to the checkout process.

C2C

(consumer to consumer) many websites provide a variety of mechanisms that allow any person to sell new or used goods to another person. Auction cite ssuch as eBay, allows customers to big against each other.

DDoS/Dos

(distributed denial of service) attacks allows hackers to shut down or block acess to websites and other network resources by overwhelming them with requests.

DNS

(domain name system) the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name peoples use to locate a website to the IP address that a computer uses to locate a website.

white hat

(hackers) noncriminal, security specialist.

black hat

(hackers) referenced as "crackers" mischief/steal, people who commit crimes

HTTP

(hypertext transfer protocol) request web pages are transmitted using a protocol known as _________.

ISP

(internet service provider) every type of internet service request a connection and a monthly payment to an _______. the speed at which data travels to and from the ____ is measured in bits per seconds. (kilobit is a thousands bits, megabits is a million bits)

LAN

(local area network) data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.

MAC Addresses

(media access control address) hardware address that uniquely identifies each node (and or device) of a network. this is manufactured into every network card, such as an Ethernet card or wifi card, therefore cannot be changed.

P2P

(peer to peer) the most popular method for file transfer today is known as _____ file sharing. This method uses a distributed network of individual users instead of a central server to transfer files. peer to peer networks are also used for illegally sharing copyrighted work such as movies, books, music, and software.

PAN

(personal area network) a computer network used for data transmission amongst devices such as computers, telephones, tablets, and personal digital assistants close to each other. ex: person traveling with a laptop with a protable printer.

TLD

(top level domain) .com ,gov. etc.

blog

(web log) a web page or small website that contains a series of chronological post and comments.

WPA

(wi-fi protected access) a security standard for users of computing devices equipped with wireless internet connections, or wifi. it improve upon and replaced the original , WEP

WAN

(wide area network) the connection of two or more central computers or LANs, generally across a wide geographical area.

WEP

(wire equivalent privacy) a security protocol, specified in the wifi standard, 802.11b, that was designed to provide a wireless local area network (LAN) with a level of security and privacy comparable to what is usually expected of a wire LAN

WWW

(world wide web) a global system of linked, hypertext documents.

WiMax

(worldwide interoperability for Microwave access) a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. ex: connecting to an office network from a hotel room and then again from a coffee shop.wireless broadband, region (large area).

Googlebot

1988, google's web crawling bot (spider) it discovers new and updated pages to be added to the google index.

4G

A mobile communications standard intended to replace 3G, allowing wireless internet access at a much higher speed.

Protocols

Computers that communicate over a network must follow certain rules or ____ to ensure that the transmission is sent properly and understood.

Coax

_____ cables. consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath. Main advantage is that it is less susceptible to signal interference and allows for larger distances.

Fiber Optics

_____ cables. consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Client/Server

_____ sends request to another program while ____ receives and the responding program that processes the request.

Twisted Pair

_______ cables. normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the "network cable".

wiki

a collaborative information site that relies on the internet community to both create and edit content. most popular of these cites, offering millions of encyclopedia style articles for free. Can lead to misleading info or error since people can contribute and edit these articles.

client

a computer program that sends request to another program to perform its actions.

social engineering (and tactics of)

a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

ARPANET

a goal of this project was to create a large computer network with multiple path, on the form of telephone lines that allowed researchers in one location to access the computing resources at another location. Discovered around 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of defense began connecting computers resulting this network called _____.

Botnet

a group of computers connected in a coordinated fashion for malicious purposes. each computer in a botnet is called a bot. these bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.

Packet sniffer

a sniffer program that targets packets of data transmitted over the internet.

URL

a(n) _____ is a web address that specifies the exact location of a web page using letters and words. (uniform resource locator) includes several components : protocol, domain, subdomain, and folder and file.

ransomware

also called "scareware" which tricks users into following a thief's orders, malware usually tries to remain hidden from user so that it can do its damage for as long as possible

node

any system or device connected to a network is called ____.

sharing

anything with sharing, emails printers, looking up something anything within computers as well.

scalability

capacity to provide increasing amounts of computer power, storage, and/or software. They allows organizations to buy affordable systems that meet their current computing needs and gradually increase their computing capability only as needed.

stuxnet

computer malware worms first discovered in July 2010, mainly targeted windows and PCs or the SCADA (supervisory control and data acquisition)

fault tolerance

computers are able to continue their operation even when problems are present.

Ethernet

discovered by Xerox, most widely used standard for local area networks.

IP Addresses

every computer or device that is on the internet needs an ___ ________ that uniquely identifies it.

Internet

global network, networks connecting to others networks, half the world about 50% have this access

keylogger

hardware device or software program that records the real time activity of a computer use including the keyboard keys they press.

Spam

huge growth of email has also come with an increase in _____, which is unsolicited email that is sent in bulk (junk mail)

throughput

in data transmission, network _____ is the amount of data moved successfully from one place to another in a given time period, usually measured in bits per second,(mega, giga etc)

Piracy

in the world of computing, _____ means acquiring or exchange copies of protected digital creations without payment to or permission from their creator.

malware

mal = bad, malicious software that enters a computer system without the owner's knowledge or consent. the most common threat to data and security.

Wi-Fi

most popular standard for wireless networking is called 802.11 or _________. This signal strength can be heavily affected by barriers such as the walls and floors of buildings. (Current the fastest are 802.11b, 802.11g, 802.11ac)

IPv4

most widespread addressing system is know as ____. A 32 bit address 4 octets 216.77.4.202 (cannot be higher than 255) however it is slowly being replaced by the newer version.

packet-switched

network that divides messages into packets and sends each packet individually. these are more efficient if some amount of delay is acceptable

circuit-switched

network thats in the telephone system, which links together wire segments to create a single unbroken line for each telephone call. this is ideal for communications that require data to be transmitted in real time.

Copyright

one of the foundation blocks of intellectual property law is the ____, a legal concept that grants rights and control to the owner of any published work ( book, song, painting etc)

Logical Ports

ports, in tcp/ip networks, a port is an endpoint to a logical connection and they way a client program specifies a specific server program on a computer in a network.

Cable

rope like bunch of wires used to connect two things

DSL

send it over the phone line, uses digital subscriber line, high speed, can go up to 100khz, satellite (this one is slower)

social networking

sites are used to create connections between friends, family, and organizations. Allows users to keep up to date with events happening. Ex: Facebook, Linkedln (business oriented)

Cookies

small data files that remember users and their preferences for a specific website are called ______. First party ______ are ussies and read by the actual website you are on. Third party _____ are typically created by marketing and ads companys that work with the website you are visiting. Third party ______ are also called "tracking cookies". ex: need cookies on a shopping cart for online shopping, they need to remember something about you. "state"

802.11

standard for wi-fi

robots.txt

text file present in the root directory of a website. Is a convention created to direct the activity of search engine crawlers or web spiders.

IPv6

the _____ is slowly replacing the IPv4, which this offers many more possible addresses. 128 bit addressing.

bandwidth

the bit rate of available or consumed information capacity expressed typically in metric multiples of bits per second, (in hertz) another def.: speed, is the amount of data that can be transmitted over a given time.

data mining

the discovery of new patterns or relationships between data. the large databases that support information systems can provide an ideal environment for______ _____. Example of this is the gov. can correlate and analyze data from many different areas to track needs and spending, look for possibly disease outbreaks, and identify potential security threats.

spyware

the files you open and search, using "key logger", designed to report activity on your computer to another party. such as personal info like passwords, account #'s, browsing history, or anything that would be useful to a theif.

HTML

the fundamental language of a web page is _____ (hypertext markup language) Used along with newer languages such as CSS and JavaScript

Digital footprint

the information about a particular person that exists on the internet as a result of their online activity.

Encryption

the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Important method for providing data security, especially for end to end protection data transmitted across networks.

server

the receiving and responding program that processes the requests of the client program and enables the client to execute its actions.

Tim Berners-Lee

the web traces its origin to a proposal made by ___ ____ in 1989.

strong passwords

this is difficult to guess or crack by thieves by having a _______ ______. Usually these are long and use a mix of uppercase and lowercase letters, numbers, and at least one symbol such as a dash or period.

HTTPS

this is the secure version of HTTP<- the standard web protocol.

MAC filtering

to specify which device you can allow or deny access to a particular service. Allow all the devices whose mac-address is in the block/filter list. deny all denies all the devices except the devices who mac address is explicitly specified to be allowed.

Web browsers

to view web pages, you need special software know as a ____ _____. typical components of a ____ ____ include: address bar, navigation button and tabs. Ex. : apple safari google chrome, Microsoft edge, Mozilla firefox

TCP/IP

transmission control protocol (packets)/ internet protocol (deals with addressing & stays the same) every device connected to the internet has a _____ address. The protocols at the heart of Internet communication are know as ____.

podcasts

type of broadcast, many of these are typically prerecorded and can be downloaded from a variety of sources.

virus

type of malware that is attached to a host file and has the ability to replicate or copy.

worm

type of malware that self replicates and spreads through computers and networks.

Pretexting

type of social engineering, by gaining someone's trust by pretending you are someone else.

Phishing

type of social engineering, it involves luring individuals into entering personal information into a website controlled by the hacker.


Conjuntos de estudio relacionados

MGT 3900 Conceptual Final Review

View Set

Chapter 4 : Folk and Popular Culture

View Set

Chapter 2- Life Basics -A.D Banker

View Set

Chapter 07 Mediated Communication and Social Media

View Set

HESI Review Test-Maternity, HESI Exit 5, OB HESI/FINAL, HESI with Rationale 12, HESI OB/MATERNITY Practice Quiz, HESI

View Set

Chapter 11: Technology, Production, and Cost

View Set

Life Insurance, Policy Provisions, Options, and Riders

View Set

Chapter 6: Memory- Remembrance of Things Past and Future

View Set

Biology 114- Chapter 10 Learnsmart

View Set

Abeka 8th History section 16.5 review

View Set