Networks and the Internet

¡Supera tus tareas y exámenes ahora con Quizwiz!

most common domains:

-.com -.org -.edu -.net -.gov

Which of the following is true about sponsored links?

-Companies have paid Google to display sponsored links -Sponsored links want to sell you something

Which of the following improved networks by increasing speed or by improving the ability for businesses to use networks?

-Ethernet -ISDN -minicomputers -Gigabit Ethernet

Which of the following statements are true of hackers?

-Hackers may have different motivations -Some hackers hack as a form of protest. -Some hackers are network security professionals who want to improve the security of a network by identifying flaws -Some hackers are criminals

Which of the following statements are true of hacking?

-It is the practice of finding weaknesses in a computer or computer network -It is sometimes practiced by network security professionals

Which of the following are true of copyright?

-It protects intellectual property for the life of the author plus seventy years -It protects ideas

Which of the following are true of the trademark?

-It protects the use of a symbol -It associates the item with its maker

Which of the following statements are true?

-Networks are expensive to set up and maintain -Network staff need to keep accurate records on what has been done to a network

How has communication benefitted from Internet use?

-People are more able to easily and quickly communicate with one another -People communicate across long distances in real time

different types of servers

-database servers -communication servers

Accuracy:

A site is usually accurate if you can find the same information in other locations, and if the sources cited on the web page actually support the information. Other clues include correct dates, correct spelling, and the same or similar data in other locations.

Relevance:

Check the dates on the website. They need to be relatively recent. For instance, any websites that have information that is over five years old are not useful if you are looking for information on computers. Look at the way the page is written; if the author seems to only be telling one side of the story, you may want to look elsewhere.

What event in the 1970s contributed to the current state of the Internet?

Computer hardware became more powerful

Why should encryption be used?

Encryption protects sensitive information

Skilled labor:

Greater skills are needed to set up the network. Users need more technical skill than just plugging a cable into a computer's port

Is the use nonprofit/educational or commercial?

If it is not being used to make money, it is more likely to be considered fair use

2. How much of the copyrighted work was used?

If only a little part of the work was used, it is more likely to be considered fair use

Packet-switching was advanced by which of the following people?

Leonard Kleinrock

Equipment sharing

Networks allow people to share printers and scanners within a group

Screen sharing

Networks allow two people in different places to be on the same computer at once. This is beneficial if the people are working on a project together or one of the people needs help.

Mobility:

People can access the Internet from many locations within the broadcast area

Memory storage

People can share storage on a server at their work or school. This storage can be much larger than that on a normal computer. Large files such as movies can be stored and easily accessed on a network

In the following citation, which word is the author's last name? Sachar, Louis. Holes. New York, NY: Farrar,Straus, & Giroux, 1998.

Sachar

What was the original intention for the creation of ARPANET?

Scientists could share information and collaborate

Why did the creation of ARPANET help with this critical need?

Scientists needed a way to work together to share their research and findings

Signal Strength:

The greater the distance between the router and the computing device, the slower the speed

Reliability:

The website must say where the information came from. You should be able to check to see that those sources are real. Also, think about why the person put up the site

Authorization:

Unauthorized users and unwanted intruders access the network more easily

Security: 1

Users can access the Internet with a network password or a subscription to a broadband Internet service

The trademarked name of the accepted standard for configuring wireless networks is

Wi-Fi

When a local wireless router sends the signal it is using

Wi-Fi

Speed:

Wi-Fi and broadband are not as fast as wired connections, although adequate for home networks

What does WLAN stand for?

Wireless Local Area Network

Interference:

Wireless networks have more interference issues than wired networks do. Devices like wireless gaming controls, microwave ovens, fluorescent lights, and electrical connections that are bad can all cause interference

Access:

With broadband, users can connect to the Internet anywhere their devices can receive a signal, as long as the signal is from the Internet service they subscribe to

the National Science Foundation (NSF)

a US government agency concerned with research into science and technology

All networks are connected to the Internet by _______

a backbone

wireless network

a computer network that can be accessed without wires or cables by receiving a short-range radio signal -signal goes through the modem and is broadcast through a wireless router

backup

a copy of all data on a network

1980s

academic researchers and the military continued to increase their use of the Internet -also witnessed the introduction of personal computers (PCs)

Adware

advertising that is embedded in software to pay for applications that users get for free

nondisclosure agreement

agreement states that they will not share any information that would be damaging to the business with people outside of it

Control information

all of the addressing information needed to deliver user data and information for the receiver to make sure that the packet was not corrupted during shipment

Bridge:

allows specific kinds of data into different parts of the network

A wireless mobile device is set up so that it can receive a signal

anywhere its service broadcasts and it can receive a signal

Computers not connecting:

check that switches, routers, and hubs are working, and that configurations are correct

Remote data storage and the ability to access data from any device using the Internet is called

cloud computing

Local Area Network (LAN)

connects all of the computers in one location, such as in a school or a business

hub

connects many different devices and allows them to connect to the network using a single connection -also forwards any packets it receives to all devices connected to it -makes connections with many devices and then connects them to the network with a single port

switch

connects network devices or different parts of a network -sends any packets it receives to only their intended recipients and not to all devices connected to it

The network backbone

connects routers to more efficiently route data

network packet

contains two kinds of information - user data and control information

Robert Kahn

developed the idea for the way that computers would interact with each other over the Internet, known as the Transmission Control Protocol/Internet Protocol (TCP/IP)

It is difficult to pass laws about behavior on the Internet because

different countries have their own laws that govern Internet behavior

hop

each router-to-router leg of the journey

Ethernet

enabled faster and more precise transmission of data

antivirus software

guard against downloading viruses, and most guard against downloading spyware

Firewalls:

help keep out unwanted traffic and intruders - many personal computers also run firewalls to keep intruders like viruses out

Which of the following is the main cause of network failure?

human error

software piracy

if you create a game that users copy without your permission or without paying you

Transmission types

include serial transmission and parallel transmission

Hackers

individuals who practice hacking, are motivated by any of a number of reasons

payload

information sent by a user, such as an e-mail

decryption key

is needed to decode the cipher text

.edu

is reserved for higher education, like a university

If a citation has a volume, title, and page numbers, it is a:

journal article citation

Tim Berners Lee

known as the inventor of the modern Internet -proposed the idea of hypertext as a way to link information across the web -hypertext

Which of the following is a current development in networking?

need for better data storage

Peer-to-peer (P2P)

networks are created between two computers that connect directly to each other

network host

networks are formed by an assortment of computers and devices

Wide Area Networks (WANs)

networks that cover large areas

passive threat

occurs when a person who is not the intended recipient captures data in some way

Spoolers

programs that store data temporarily for processing by another program later -print jobs, for example, are often spooled

Shared resources

refers to information or devices that can be accessed remotely from another computer

Open source

refers to software that exposes its source code for user modification and redistribution. It may or may not be free of cost

File sharing

refers to the practice of allowing someone else to have access to files or computer programs

What did networks of the 1960s use to connect computers?

telephone lines

Hypertext

text in a document that is linked to other information -early networks used hypertext to link research and other information -hypertext is used in the same way over the World Wide Web

Vinton Cerf

was a leader for a group of people who created standards in naming on the Internet -this group is now known as ICANN (the Internet Corporation for Assigned Names and Numbers) -domain name system management

Ethernet

was invented to allow a computer to "listen" to see if the network was clear and data could be sent

.net

was originally reserved for network sites but is now used as a general domain

The Internet Architecture Board (IAB)

was set up in 1979 by the United States Department of Defense's Defense Advanced Research Projects Agency (DARPA) to address the technical and engineering aspects of the growing Internet

Wikis

websites that make it easy for people to collaborate on creations because everyone has the ability to edit the content in this application

cookies

which are small pieces of information that are stored through a user's web browser

quarantine

which means that they are made ineffective

When data is transmitted wirelessly, the computer needs_____ in order to receive it

wireless access technology

Lawrence G. Roberts and Leonard Kleinrock

worked together at the Massachusetts Institute of Technology (MIT) on an early packet-switching idea

network backbone

allows for high-speed connections between major parts of a network -the internet has a backbone that carries data throughout the world

Cloud computing

allows users to store items like photos, videos, music, documents, and even applications in a place they can access using the Internet

Antivirus programs:

also help keep viruses out of the network

online predator

an adult who tries to make friends with young people to abuse them or in some way exploit the "friendship"

Network performance management

an area of network administration that is concerned with how well the network is working

Fair use

an exception to copyright that allows people to use copyrighted works in limited ways without an author's permission

queue

an ordered waiting list of tasks, such as files waiting to be printed

Search results

are a list of web pages that are most relevant to the keywords you searched

Internet Service Providers (ISPs)

are companies that offer Internet service -when people connect to the Internet, they connect to an ISP's computers and network.

Sponsored links

are links that companies paid Google to display when people type those keywords

Secured networks

are network systems that are open only to those with the right credentials

Computer viruses

are programs that copy themselves onto others' computers

Applications

are programs used by these computing devices to let users do all kinds of things, from using calendars and efficiency tools to playing games and reading e-books

Patents

are registered ideas for techniques, inventions, or processes -a person is protected as the owner of the intellectual property

Routing protocols

are rules for how routers communicate with one another and send data

Organic links

are the regular links that appear when you do a search

Unsecured networks

are those that can be accessed by anyone

Which of the following apply to the definition of Wide Area Networks?

-cover large geographic areas -link many networks together -known as WANs

Select all of the things you can do to protect your computer from viruses:

-do not open email attachments from anyone you do not know -install anti-virus software -only share your e-mail address with people you know -label any spam that gets through your e-mail program's spam filter

Which of the following are acceptable to share?

-files that you have permission to share -works that a Creative Commons license says you can use

many network software programs used in network administration:

-firewalls -antivirus programs -Network operating system (NOS)

many common hardware components used in networks:

-gateway -router -hub -bridge -switch

In the future, mobile technologies are expected to be used more than desktop computers today. What other improvements are helping support mobile computing?

-increased data storage online -more applications for mobile phones

Speed of connecting to other people

Instead of sending a letter by mail, people can easily and quickly connect to others using networks. Networks speed up many aspects of social interaction.

Which of the following behaviors should be avoided?

-keeping someone from using the Internet -sharing private information by posting it publicly on the Internet -using a computer at school to play games when someone else needs it for schoolwork

Which of the following are potential consequences of plagiarism?

-loss of a job -damage to one's reputation -getting kicked out of school

The network administrator is important in keeping the network healthy. Which of the following describes the role of a network administrator?

-maintains the telephone and computer networks -documents the network changes

advantages to wireless networks

-mobility -cost -security -access

Which of the following are recent trends?

-more access points -new applications

Which of the following activities have been made possible because of improvements in computer networks?

-organizing the storage of data -accessing the Internet at the same time as other users

Which of the following can be done by a computer virus?

-overwrite a computer hard drive -e-mail themselves to other user e-mail accounts -slow down the computer

Which of the following types of data can be stored using cloud computing?

-photos -movies -documents -music

Select all the activities that can be done online

-play games with friends -work -talk to other people -watch movies

When you cite your sources and give credit to the authors, you are:

-practicing ethical behavior -allowing people to know where you got your ideas -behaving in a scholarly way

Which of the following devices can send or receive information on a network?

-printers -e-book readers -clients -servers -smartphones

Which of the following locations are more likely to have networks that are unsecure?

-public library -airport -public access network

RARA method:

-reliability -accuracy -relevance -authority

With which of the following is network administration concerned?

-security -hardware -software -network setup -network maintenance

Which of the following are considerations in e-commerce and e-government Internet sites?

-security -protection of sensitive information

Guidelines for Ethical Behavior on the Internet

-seeks to gain unauthorized access to the resources of the Internet -disrupts the intended use of the Internet -wastes resources (people, capacity, computer) through such actions -destroys the integrity of computer-based information, and/or -compromises the privacy of users

You have read about the beginnings of the Internet and how it was created. What was the Internet originally created to do?

-share research -communicate -share documents

disadvantages to wireless networking:

-skilled labor -authorization -speed -signal strength -interference

Software as a Service (SaaS) allows users to remotely access which of the following?

-software -data -applications

Which of the following are activities that represent inefficient and/or unethical uses of the Internet?

-taking a break from working by playing an online game -behaving in a way that is unacceptable in person

What are some threats to networks?

-the possibility of data loss -the possibility of viruses -the possibility of a network shut-down

A router sends data

-to the correct computer -where it should go -based on the data's destination

Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services?

-voice -television -Internet -mobile phones

Why do you need to cite your sources?

-you give credit to the original author -you avoid plagiarism

Sergey Brin and Larry Page

made a great contribution by creating a way to get good results from online searches using their expertise in computer science -search engines

Equipment not working:

make sure all equipment is plugged in, turned on, and connected using correct cables and connections

Switch:

makes connections between parts of the network or between the network and devices

Citing your sources

means giving credit to the source where you got your information -if you do not cite your sources, you may be stealing another person's work and ideas, or plagiarizing.

Telecommunications

means the telephones in a company as well as the computer network

Bandwidth

measures how much data can flow through a specific connection at one time -describes the maximum data transfer rate, or capacity, of a network or Internet connection

Communications servers

might handle requests for voice communications

.com

most commonly indicates a business website

.org

most commonly indicates a non-profit organization

wide-area ring backbone

nationwide businesses can have their own dedicated backbone that only carries their data in a point-to-point manner

active threat

occurs when an individual disrupts or captures data from a network

IP address being used by more than one computer:

often fixed by having user log off or shut down and log back on

Social networking

online communication through websites and other web services designed to connect people in social ways

2000s

open source software was developed and released

Gateway:

part of the network that allows communication with other networks

Speed

refers to throughput, which is the actual amount of data that makes it through a connection per second (mbps)

dedupe

remove duplicate information from storage

Trademarks

represent a brand -include logos, slogans, words, phrases, and symbols -can be registered with the government so that they are officially associated with a business or an organization

Lost or damaged network files:

restore files from backup files - backup files should be updated regularly in case of problems

The network backbone is not directly connected to computers. Instead, data goes through the______ first

router

Network operating system (NOS):

runs the network and its software components, such as the firewall and antivirus program -the software used to run a network

Serial transmissions

send data one piece at a time

parallel transmissions

send many pieces at a time

Spyware

sends out information about individuals or their computers without their knowledge

Software as a Service refers to

software you can access using any device

What type of connection did networks use to communicate in the 1960s?

telephone

1990

the Internet had been developed enough that the original framework of the Internet called ARPANET was no longer needed and was taken offline

Fault tolerance

the ability of a network to recover after any type of failure -many networks run "mirror" operations on a separate server to keep the network up and running if there is a failure

Integrated Services Digital Network (ISDN)

the ability to carry voice, as well as data, video, and other network communications at the same time on telephone lines

E-commerce

the ability to do business online -online banking, online shopping, and online financial transactions of other types are known as e-commerce

Plagiarism

the act of taking someone else's writing and passing it off as your own

Troubleshooting

the act of trying to fix what is wrong in a system -a creative problem-solving skill that network administrators need to use regularly

software

the collection of programs that run on hardware

1970s

the computer program, or set of instructions for the computer to follow, was developed so that non-computer scientists could also use computing in their work

client

the computer that uses the service provided by a server

J. C. R. Licklider

the first leader of the computer research program at Defense Advanced Research Project Agency (DARPA) -galactic network

Advanced Research Projects Agency Network (ARPANET)

the first network to connect computers across long distances -created so that scientists could share information and collaborate

Which of the following are considered software piracy?

-burning a music CD to give your friend from a band you both like -copying a program to give to someone else to use -burning a copy of a DVD to sell

Identify the ways to refine your search so that it is more successful

-change your search terms to be more specific -add a keyword that might help make your search more detailed

Which of the following are techniques for maintaining a secure network?

-checking for and installing software updates -regularly backing up data on the network

Which of the following are benefits of using the Internet for communication and work?

-communicating with other people -collaborating on projects -finding people with similar interests

mark all potential problems with using the Internet

-People may not be as truthful online as they would be in face-to-face communication -People may choose the first possible solution to a problem

Which of the following are benefits of using a network?

-People who are far apart can work together -Using a network is a quick way to communicate -Using a network makes sharing information easier -Using a network makes staying in touch with friends easier

Which of the following statements describe characteristics of a secure network?

-Personal information is kept safe -The network is used only by people who are allowed to access it -The network is not compromised

How did the use of ARPANET change computing?

-Scientists were able to communicate over large distances -Scientists could use computers that had different operating systems -Computers no longer had to be wired to a main computer to communicate

Why is spyware more dangerous than adware?

-Spyware tracks users' online behavior -Spyware is an invasion of privacy

Which of the following is a true statement about the online environment?

-The online environment makes it easy for predators to take advantage of young people -It is difficult to know who you are really communicating with online -Stopping online predators is one of the top three priorities of the FBI

Which of the following are efficient ways to use the Internet?

-Use the bookmark function in the browser bar -Know what you are looking for before you start

Which of the following does cloud computing allow users to do?

-access data from anywhere with an Internet connection -store pictures and music -store data

Usually all citations include the following:

-author -year of publication -title of the article -name of the journal -the volume and number (or sometimes the season of the year) of the journal -page numbers where the article can be found

Citing a Journal Source:

-author's last and first name -title -name of the journal -volume, issue number, and pages -publication date

Even though data travels at the speed of light, networks can be slow. What affects the download speed of the network?

-bandwidth -internet connection

Communication

It is easy to share documents, pictures, and other files using a network.

Cost:

It is less expensive because each device no longer needs its own cable

Authority:

It should be apparent who is responsible for the web page. A trustworthy site should be able to tell you why they are a good source of information.

3. Will the use affect the value of the copyrighted work?

If sales of the work are not affected, it is more likely to be considered fair use

Which of the following applies to patents?

They protect the rights of the intellectual property owner

server

a computer that provides special services to client computers on demand -are the computing devices that help connect computers with other parts of a network

router

a device that sends data to the correct destination on a network -reads the information in a network packet and steers the data to its correct destination -router makes sure that requests for information are handled efficiently and correctly -routes data where it should go based on its destination

modem

a device used to connect to the Internet. It translates the signals it receives from the ISP into a form that can be understood by a client computer

Software as a Service (SaaS)

a form of cloud computing -enables more people to use the software

dead link

a link to a web page without any content

Creative Commons

a nonprofit organization that helps creators to determine how people can use their work

network

a set of computers and other peripheral devices, such as printers, that are connected to each other and can communicate with one another -smartphones use computer network connections to access the Internet, and e-book readers use networks to download books

Ethics

a term that is used to describe how to behave in a way that is for the good of everyone

Broadband

a term used to describe any networking technology with a higher bandwidth than older technologies

search engine

a tool for finding information on the web. It finds and stores information about the pages on the web and analyzes the information so it can be searched easily

Star topology

a type of network topology in which all computers are connected in a "star" formation -computers are the arms of the star, and a switch, hub, or other computer is at the center of the star

Peer-to-peer

a type of network topology that does not use a router but shares data directly between computers

IP address

a unique address for a computer on the network

Database servers

house the databases and handle requests for information stored in them

.gov

is for the US government only -those who write these sites must have official authorization

Network security

the group of actions that keep a network safe from potential failures and from attack by intruders

Network administration

the management and maintenance of networks within an organization, such as a school or business

hierarchical addressing scheme

the numbers in the IP address are presented in a particular order based on their locations in the network -the same technique used in area and country codes for telephone numbers

Hardware

the physical equipment itself

Hacking

the practice of finding weaknesses in a computer or computer network

Cloud computing

the practice of storing data, like pictures, video, music, and even programs on servers that can be accessed through a web browser -refers to providing not just storage, but also computing, as a service

cipher text

the resulting text

Copyright

the right to copy or reproduce a song, photograph, movie, or written work -begins as soon as the creator produces the work

Intellectual property

the term for copyrighted creations -what you create on your own, out of your own imagination

E-government

the use of the Internet to keep the public informed about what is going on in their towns and states as well as on a federal level

Network topology

the way a network is laid out or organized, including all the interconnections

Keywords

the words people type into search engines

Encryption

turns text into a form that is nearly impossible for unauthorized computer systems to read

Spam

unwanted communication that comes in many forms

A wired network

uses cables between devices to make a connection


Conjuntos de estudio relacionados

Digestive and Gastrointestinal Function (CH 43,44,45,46,51)

View Set

Chapter 16.3 European History Terms

View Set

Chapter 17: Communicating Social Science Research Findings Review

View Set

KIN 70 - Chapter 12: Sport Management (EXAM 4)

View Set