ITEC Final Exam Prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

Packet sniffing

computer hardware device or software program designed to detect and record digital information being transmitted over a network.

ROM(Read Only Memory)

computer hardware that stores programs or data that cannot be added to, modified, or deleted

End User License Agreement. (EULA)

covers a single software item

Malware

designed to steal information, destroy data, and capacity at computer or network, and frustrate the user.

Which of the following are common tasks performed by utility programs?

disk cleanup, file search, system backup and restore

VPN Virtual Private Network

employs a method called tunneling in which each packet from the sending computer is encapsulated within another packet before being sent.

The machine cycle consists of which four steps?

fetch, decode, execute, and store

GUI (Graphical User Interface)

graphically based interface that allows a user to communicate instructions to the computer via typed commands

DSS (decision support system)

helps manager make decisions such as budget planning and new product development

the protocol

https://

URL (Uniform Resource Locator)

https://facebook.com/ninanguyen

Authentication

individual must confirm his or her identity

ISP

internet service providers

Computer platforms

is operating system

Executive Support Software (ESS)

it allows senior management to dill-down into all areas of a business's sales, inventories, production, marketing, and operational databases. They also provide management information for senior managers such as company presidents and chief executive officers.

domain is the

middle portion including .com example: facebook.com

Word Size

number of bits that a computer can process at one time

path is the

part after .COM example: /ninanguyen

System software

programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called

Bluetooth

short-range wireless transmission protocol

Enterprise Resource Planning (ERP)

software allows top management to gain visibility on all aspects of the organization.

Employee monitoring

software is designed to track and record the use of network and hardware resources in the workplace by employees.

Wide area network (WAN)

spans a large physical distance. Internet is largest WAN covering the globe. WAN is a collection of LAN'S. If school has multiple campuses located in different towns, each with its own LAN connecting LANS of each campus by telecommunication lines allows the users of the LANs to communicate.

Bits

the smallest unit of data a computer can process (computer language is binary)

Dial-up Connection

uses the facilities of the public switched telephone network to establish a dialed connection

Types of malware

viruses, worms, and Trojan horses Macro virus

Computer platform Types

windows, mac, android OS, iOS

AUPs (acceptable use policy)

written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners

Local Area network (LAN)

- Collection of computers that are connected in a small geographic area such as an office, college campus, or in your home. - A home network LAN can consist of 2 computers, your TV, video game system, and a shared printer. - Ethernet is the most popular networking standard for LANs.

what's true about troubleshooting network hardware issues.

- Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. - A device that isn't positioned properly can cause weak signals and system issues - If your network isn't working it is a good idea to check the status of the indicator lights

characteristics of a traditional hard drive

- contains platters - contains read/write heads - stores data magnetically

characteristics of an SSD.

- no moving parts - extremely fast

Rank the storage capacities from highest to lowest

1. petabyte 2. terabyte 3. gigabyte 4. megabyte 5. kilobyte

Which three of the following statements are true regarding dual-band routers?

1.Can transmit Wi-Fi signals in the 2.4 GHz frequency range. 2.Can transmit Wi-Fi signals in the 5.0 GHz frequency range. 3.Can minimize the Wi-Fi signal's interference from microwave ovens and car alarms.

Select three true statements regarding persistent cookies.

1.Collect information about the Internet protocol (IP) Address. 2.Collect information about user preferences. 3.Collect password and username information.

bytes

8 bits = 1 byte, every letter, number, or special character on the keyboard is represented by 1 byte

Operating systems (OS)

A computer platform is commonly referred to as manages hardware and software, supports the computer's basic functions, and runs programs

Cybercrimes

A crime in which a computer is the object of the crime or is used to commit a criminal offense.

Black hat hackers

A hacker who uses his or her knowledge to destroy information or for illegal gain.

Firewall

A security system separating 2 networks or even computers on the same network is called a

The internet evolved from a Department of Defense funded project called ________, that attempted to link computers from 4 separate university networks

ARPAnet

Switch IS WHAT

Acts like a traffic signal on a network. Traffic data packets to the nodes their suppose to go to(nodes are on same network). In addition to the NIC, the keep track of the data packets to find their destination

Cyber criminal

Actual individuals committing the crime

Distributed denial service attacks (DDoS)

An automated attack that's launched from more than one zombie computer at the same time. IS A CYBER ATTACK

White hat (ethical) hackers

Breaks into systems for non malicious reasons such as TESTING security vulnerabilities

Types of ISPs

Cable Internet Service. DSL Internet Service Fiber Internet Service Wireless Internet Service Satellite Internet Service

Random Access Memory

Computer has MORE than phone

Switch

Connects devices within a network keeps track of connected devices THROUGH MAC addresses and is usually incorporated in a router

Modem

Converts analog signals into digital signals, and digital signals into analog signals

The DMCA was to create an upload version of ________ laws to deal with the issues of regulating digital material

Copyright

Cyber crime

Criminal ACTION

W3C (World Wide Web Consortium)

Develops recommendations and prototype technologies related to the Web

DMCA

Digital Millennium Copyright Act

Self-driving cars

Google's self driving car AI

Broadband

High-speed internet connection such as cable, satellite, or digital subscriber line (DSL)

HTTP

Hypertext Transfer Protocol

MAC address

Identifies a device within a network

Self-driving trucks may soon be a common sight on interstate highways thanks to pulsed laser tech known as ___:

LIDAR

Artificial Intelligence

Machine learning - the ability of computers to learn without being programmed

electronic (solid state)

NO MOVING PARTS

Select what's true about system software

One of the most important types of system software is the operating system. System software refers to programs that offer the structure and hardware control necessary to run the computer and its peripheral devices

Linux OS

Open source Free and open-source software that can be used and modified by anyone. Most common OS on servers, mainframes and supercomputers. The underlying OS for most video game consoles and embedded computers as well as the underlying software for the Android OS. Open source software that can be modified by users and is very secure. Free to download and use. Less susceptible to viruses.

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Overclocking

Pharming

PLANTING malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.

Word processing software

Pages for Mac, Google docs, Microsoft Word

Intellectual property

Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form. Human knowledge.

LinkedIn

Professional

Rootkits

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.

RAM

Random Access Memory RAM stores data and allows the computer to load information quicker as it remembers it. CLEARED WHEN DEVICE POWERS OFF

Dash replenishment service

Remember anything amazon related

Data from the hard drive reaches the CPU ___ than data from the RAM.

Slower

Applets

Small application programs that are often utility programs that perform less complex operational functions.

Management Information Systems (MIS)

Software that assists managers by improving efficiency and effectiveness.

Viruses are Designed to:

Steal information Destroy data Incapacitate a computer or network Frustrate the user

Clock speed and clock rate ?

THEY are the same

Zombies

The computer controlled by a hacker. (ONE person)

Router

The device that connects 2 networks and often provides firewall protection is a

Phishing

The process of SENDING e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.

IP addresses

The router identification (kind of like an address to the router specifically)

Firewire

Thunderbolt port, commonly found on older Apple computers

Maintenance type tasks can be executed using ______ that are included with most operating systems

Utility programs

Security protocols for Wi-Fi networks

WEP (Original) WPA (second short lived) WPA2 (CURRENT security protocol for WIFI!)

Buses

Where data flows between different parts of the computer (BUS=Tunnel for Data)

WWW - what is it

World Wide Web Created by Tim Berners-Lee at CERN

Server relationship

a computer that provides resource and services to client computers that requests them (large scheme!)

Client relationship

a computer that requests resources such as a web page, spreadsheet, image file, or services from another computer on a network (small scheme!)

Copyright protection

a legal concept that grants rights and control to the owner of any published work

TPS (Transaction Processing System)

a transaction processing system is an organizations basic accounting and record keeping system

Cache

addition to the RAM, modern processors temporarily keep frequently accessed data

Bus width

amount of data that can be transmitted over a channel at a given time

File Transfer Protocol (FTP)

application transfer protocol that is used to copy file from 1 computer to another

Productivity software

apps designed to make individuals or businesses more efficient ex: iWork, Google Docs, Office

Botnets

are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. (LARGE ORGANIZATION)

Cookies

are used to analyze and measure traffic on a web page

Two main components of a processor are

arithmetic logic unit (ALU) control unit (CU)

The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.

clock

Two major factors that impact processor speed are

clock speed & bus width

Three common Internet transmission media.

coaxial cable, telephone wire, cell phone radio waves

Supply Chain Management Software. SCMS

combines the capability of transaction processing systems (TPS) software with the forecasting of decision support system (DSS) software to help businesses manage inventories efficiently

single-core processor

comprised of one control unit and one ALU


Conjuntos de estudio relacionados

Chapter 10 Risk Management HMI 6571

View Set

ECO121 MACRO: Chapter 9, Business Cycles, Unemployment and Inflation

View Set

Pressures (Oncotic & Hydrostatic)

View Set

Ch 2 Video Case on Konica Minolta

View Set

BLAW 14: Contracts-Voluntary Consent & BLAW 15: Illegal Contracts

View Set

ap bio quiz 3.6-3.7 cellular energetics (cellular respiration)

View Set

Real Property Videos Assessments 1-9

View Set