Final Intro to Computers
network operating system
(NOS) a computer operating system that is designed primarily to support workstation, personal computer, and in some instances, older terminal that are connected on a local area network (LAN).
AUP
(acceptable use policy) a document containing an organization's policies for the ethical, secure, and appropriate use of computer resources. Common elements of this is restricting particular services (file sharing), banning inappropriate behavior, stressing the importance of security, explaining the ownership and privacy of email, storage and other resources that you have access to.
AI, robots, bots
(artificial intelligence) involves the development of intelligent systems. humanoid robots are those that are created to imitate the appearance or capabilities of humans.
B2B
(business to business) transaction is one that takes place between companies, consumers are not involved. exs. :auto repair shops can order parts form a wide range of suppliers. stockbrokers and financial institutions can buy stocks and other commodities.
B2C
(business to consumer) online shopping is the process of buying a product or service through a website. ex. amazon. whenever you are ready to purchase an item, you place it inside an electronic "shopping cart" before proceeded to the checkout process.
C2C
(consumer to consumer) many websites provide a variety of mechanisms that allow any person to sell new or used goods to another person. Auction cite ssuch as eBay, allows customers to big against each other.
DDoS/Dos
(distributed denial of service) attacks allows hackers to shut down or block acess to websites and other network resources by overwhelming them with requests.
DNS
(domain name system) the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name peoples use to locate a website to the IP address that a computer uses to locate a website.
white hat
(hackers) noncriminal, security specialist.
black hat
(hackers) referenced as "crackers" mischief/steal, people who commit crimes
HTTP
(hypertext transfer protocol) request web pages are transmitted using a protocol known as _________.
ISP
(internet service provider) every type of internet service request a connection and a monthly payment to an _______. the speed at which data travels to and from the ____ is measured in bits per seconds. (kilobit is a thousands bits, megabits is a million bits)
LAN
(local area network) data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.
MAC Addresses
(media access control address) hardware address that uniquely identifies each node (and or device) of a network. this is manufactured into every network card, such as an Ethernet card or wifi card, therefore cannot be changed.
P2P
(peer to peer) the most popular method for file transfer today is known as _____ file sharing. This method uses a distributed network of individual users instead of a central server to transfer files. peer to peer networks are also used for illegally sharing copyrighted work such as movies, books, music, and software.
PAN
(personal area network) a computer network used for data transmission amongst devices such as computers, telephones, tablets, and personal digital assistants close to each other. ex: person traveling with a laptop with a protable printer.
TLD
(top level domain) .com ,gov. etc.
blog
(web log) a web page or small website that contains a series of chronological post and comments.
WPA
(wi-fi protected access) a security standard for users of computing devices equipped with wireless internet connections, or wifi. it improve upon and replaced the original , WEP
WAN
(wide area network) the connection of two or more central computers or LANs, generally across a wide geographical area.
WEP
(wire equivalent privacy) a security protocol, specified in the wifi standard, 802.11b, that was designed to provide a wireless local area network (LAN) with a level of security and privacy comparable to what is usually expected of a wire LAN
WWW
(world wide web) a global system of linked, hypertext documents.
WiMax
(worldwide interoperability for Microwave access) a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. ex: connecting to an office network from a hotel room and then again from a coffee shop.wireless broadband, region (large area).
Googlebot
1988, google's web crawling bot (spider) it discovers new and updated pages to be added to the google index.
4G
A mobile communications standard intended to replace 3G, allowing wireless internet access at a much higher speed.
Protocols
Computers that communicate over a network must follow certain rules or ____ to ensure that the transmission is sent properly and understood.
Coax
_____ cables. consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath. Main advantage is that it is less susceptible to signal interference and allows for larger distances.
Fiber Optics
_____ cables. consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Client/Server
_____ sends request to another program while ____ receives and the responding program that processes the request.
Twisted Pair
_______ cables. normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the "network cable".
wiki
a collaborative information site that relies on the internet community to both create and edit content. most popular of these cites, offering millions of encyclopedia style articles for free. Can lead to misleading info or error since people can contribute and edit these articles.
client
a computer program that sends request to another program to perform its actions.
social engineering (and tactics of)
a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
ARPANET
a goal of this project was to create a large computer network with multiple path, on the form of telephone lines that allowed researchers in one location to access the computing resources at another location. Discovered around 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of defense began connecting computers resulting this network called _____.
Botnet
a group of computers connected in a coordinated fashion for malicious purposes. each computer in a botnet is called a bot. these bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.
Packet sniffer
a sniffer program that targets packets of data transmitted over the internet.
URL
a(n) _____ is a web address that specifies the exact location of a web page using letters and words. (uniform resource locator) includes several components : protocol, domain, subdomain, and folder and file.
ransomware
also called "scareware" which tricks users into following a thief's orders, malware usually tries to remain hidden from user so that it can do its damage for as long as possible
node
any system or device connected to a network is called ____.
sharing
anything with sharing, emails printers, looking up something anything within computers as well.
scalability
capacity to provide increasing amounts of computer power, storage, and/or software. They allows organizations to buy affordable systems that meet their current computing needs and gradually increase their computing capability only as needed.
stuxnet
computer malware worms first discovered in July 2010, mainly targeted windows and PCs or the SCADA (supervisory control and data acquisition)
fault tolerance
computers are able to continue their operation even when problems are present.
Ethernet
discovered by Xerox, most widely used standard for local area networks.
IP Addresses
every computer or device that is on the internet needs an ___ ________ that uniquely identifies it.
Internet
global network, networks connecting to others networks, half the world about 50% have this access
keylogger
hardware device or software program that records the real time activity of a computer use including the keyboard keys they press.
Spam
huge growth of email has also come with an increase in _____, which is unsolicited email that is sent in bulk (junk mail)
throughput
in data transmission, network _____ is the amount of data moved successfully from one place to another in a given time period, usually measured in bits per second,(mega, giga etc)
Piracy
in the world of computing, _____ means acquiring or exchange copies of protected digital creations without payment to or permission from their creator.
malware
mal = bad, malicious software that enters a computer system without the owner's knowledge or consent. the most common threat to data and security.
Wi-Fi
most popular standard for wireless networking is called 802.11 or _________. This signal strength can be heavily affected by barriers such as the walls and floors of buildings. (Current the fastest are 802.11b, 802.11g, 802.11ac)
IPv4
most widespread addressing system is know as ____. A 32 bit address 4 octets 216.77.4.202 (cannot be higher than 255) however it is slowly being replaced by the newer version.
packet-switched
network that divides messages into packets and sends each packet individually. these are more efficient if some amount of delay is acceptable
circuit-switched
network thats in the telephone system, which links together wire segments to create a single unbroken line for each telephone call. this is ideal for communications that require data to be transmitted in real time.
Copyright
one of the foundation blocks of intellectual property law is the ____, a legal concept that grants rights and control to the owner of any published work ( book, song, painting etc)
Logical Ports
ports, in tcp/ip networks, a port is an endpoint to a logical connection and they way a client program specifies a specific server program on a computer in a network.
Cable
rope like bunch of wires used to connect two things
DSL
send it over the phone line, uses digital subscriber line, high speed, can go up to 100khz, satellite (this one is slower)
social networking
sites are used to create connections between friends, family, and organizations. Allows users to keep up to date with events happening. Ex: Facebook, Linkedln (business oriented)
Cookies
small data files that remember users and their preferences for a specific website are called ______. First party ______ are ussies and read by the actual website you are on. Third party _____ are typically created by marketing and ads companys that work with the website you are visiting. Third party ______ are also called "tracking cookies". ex: need cookies on a shopping cart for online shopping, they need to remember something about you. "state"
802.11
standard for wi-fi
robots.txt
text file present in the root directory of a website. Is a convention created to direct the activity of search engine crawlers or web spiders.
IPv6
the _____ is slowly replacing the IPv4, which this offers many more possible addresses. 128 bit addressing.
bandwidth
the bit rate of available or consumed information capacity expressed typically in metric multiples of bits per second, (in hertz) another def.: speed, is the amount of data that can be transmitted over a given time.
data mining
the discovery of new patterns or relationships between data. the large databases that support information systems can provide an ideal environment for______ _____. Example of this is the gov. can correlate and analyze data from many different areas to track needs and spending, look for possibly disease outbreaks, and identify potential security threats.
spyware
the files you open and search, using "key logger", designed to report activity on your computer to another party. such as personal info like passwords, account #'s, browsing history, or anything that would be useful to a theif.
HTML
the fundamental language of a web page is _____ (hypertext markup language) Used along with newer languages such as CSS and JavaScript
Digital footprint
the information about a particular person that exists on the internet as a result of their online activity.
Encryption
the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Important method for providing data security, especially for end to end protection data transmitted across networks.
server
the receiving and responding program that processes the requests of the client program and enables the client to execute its actions.
Tim Berners-Lee
the web traces its origin to a proposal made by ___ ____ in 1989.
strong passwords
this is difficult to guess or crack by thieves by having a _______ ______. Usually these are long and use a mix of uppercase and lowercase letters, numbers, and at least one symbol such as a dash or period.
HTTPS
this is the secure version of HTTP<- the standard web protocol.
MAC filtering
to specify which device you can allow or deny access to a particular service. Allow all the devices whose mac-address is in the block/filter list. deny all denies all the devices except the devices who mac address is explicitly specified to be allowed.
Web browsers
to view web pages, you need special software know as a ____ _____. typical components of a ____ ____ include: address bar, navigation button and tabs. Ex. : apple safari google chrome, Microsoft edge, Mozilla firefox
TCP/IP
transmission control protocol (packets)/ internet protocol (deals with addressing & stays the same) every device connected to the internet has a _____ address. The protocols at the heart of Internet communication are know as ____.
podcasts
type of broadcast, many of these are typically prerecorded and can be downloaded from a variety of sources.
virus
type of malware that is attached to a host file and has the ability to replicate or copy.
worm
type of malware that self replicates and spreads through computers and networks.
Pretexting
type of social engineering, by gaining someone's trust by pretending you are someone else.
Phishing
type of social engineering, it involves luring individuals into entering personal information into a website controlled by the hacker.