Intro to IT Unit 4 & Unit 5
Network Element Tablet Computer
A a portable computer typically with touch screen display and a rechargeable battery in a thin and flat design. Typically, it connects to a network via Wi-Fi.
Network Element Smartphone
A cellular device with an operating system and the ability to run third -party applications. They connect to networks using cellular wireless frequencies or Wi-Fi on local network
Network Element Server
A computer that provides services, such as website hosting and routing, for other devices
Bridge
A device that links and manage multiple networks. Ex. The device connects coaxial and twisted-pair networks. The bridge only bridges the network if a message is directed to another device.
Network Element Modem
A devices that bridges between the customer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet
What is the World Wide Web (WWW) composed of?
A hypertext document format for embedding hyperlinks to other documents, a protocol for transferring hypertext over the network, and a server process that supplies hypertext pages upon request. WWW now supports photos, audio and video.
Grid Computing
A loosely coupled distributed system that completes large tasks. Computing uses specialized software to distribute data and workload between computers in the grid.
Network Element Switch
A network device that extends the network by using packet switching to forward data to the intended hard-wired devices.
Network Element Laptop
A personal computer device that is portable with a folding design. It includes an integrated flat screen, a keyboard with a mouse, and usually, a battery. It can also contain a CDROM, DVD-ROM, as well as various other devices such as SD card readers, Wi-Fi, Bluetooth,etcetera. Laptops typically connect to networks via Wi-Fi or Ethernet
Language Processors
Language processors are sometimes considered system software. Early machine languages and high-level programming languages are still commonly used. Assembly language is machine-dependent, yet mnemonics, that are being used to represent instructions are not directly understandable by machine and high-level language as machine-independent. Machine code is computer language (i.e., in the form of 0s and 1s).
Linux Operating System
Linux is open-source operating system software. Many versions of Linux: Linux mint, Mandrake, Fedora, Ubuntu, Debian and CenOS. These OSs are free. However Red Hat and Cisco are vendors that offer Linux-based operating systems with added service and hardware costs.
Personal information managers
Manage contracts, calendars, tasks, notes, and reminders Examples Microsoft Outlook Google Calendar
Scientific Software
Manage the process of doing scientific research Examples: LabVIEW MATLAB
Phishing
Spoofing technique that seeks for confidential information. The perpetrator sends fraudulent business emails requesting information.
Database software
Store and manage data, develop data-driven reports, and provide electronic filing Examples Microsoft Access Microsoft SQL Server MySQL
Switches
Switches manage network messages to reduce LAN traffic. Older devices broadcast all messages to LAN. On a 100-device network, a switch would transmit just one message. This example would reduce traffic by 98%.
Cluster Computing
System employs numerous independent computers to perform computation or services equivalent to a larger machine. Several inexpensive machines can perform like a supercomputer. Provides high availability to at least one computer, can answer a request when others are down using. Automatically distribute requests among members to balance loads.
What monitors network behaviors such as the origin and volume of traffic?
Network auditing software, looks for anomalies to mitigate unwanted occurrences proactively or reactively.
Star Network
Network has a single device serving as a central point to which all other are connected.
Wide Area Network (WAN)
Network links a systems over a greater distance, including machines on the opposite sides of the world.
Local Area Network (LAN)
Network of computers in one building. Can be connected to create a larger network and become Wide Area Networks (WAN). Connected networks may boost company communication and effectiveness.
Internet Applications
Network protocols are rules and procedures that manage device communication securely and fast across a network. As servers and browsers improved, Web sites handled were handled by (HTTP). Online communication includes IM, browser-based chat, Twitter, and email. Simple Mail Transfer Protocol supports email transmission. SMTP uses DNS lookups to identify the email recipient and sends the message to a mail server, where it may be accessed via POP3 and IMAP (Internet Message Access Protocol).
Packet sniffing
Also referred to as a man-in-the-middle (MITM) attack, where the attacker intercepts the data as it is traveling to or from the victim's device, including authentication credentials. MITM is just one way an attacker can get unauthorized access to resources and systems.
Operating Systems Users
An OS protects computer resources from unauthorized users. Each user on a shared computer has their own account. An operating system user account has a name, password, and user privileges (e.g., administrator vs. standard user). OS utilizes log-in information to control system and resource access. Accounts are established by the administrator, who is called a superuser or root accounts. When a user logs in with the proper credentials, the operating system can be accessed. Administrators can change settings, modify software, and do other task denied to other users.
Dictionary attack
Attack is performed by the attacker by using an application and a large dictionary text file with just words. When the attacker runs the application it tries identifying the password by trying hundreds or thousands of words per minute from that dictionary file.
Why do companies do not like to publicize malicious data attacks and data breach events?
Attacks could impact their reputation and revenue, so it is difficult to find out about them.
What is the tool used to encode a document while focusing on appearance known as?
HTML (HyperText Markup Language)
Who is Tim Berners-Lee?
He developed the concept of hyperlinking in the 1980s, resulting to the World Wide Web.
baseband transmission
Baseband is a narrow-band transmission that carries data or information. LANs and serial cables
What is the role of a firewall?
Block incoming messages from untrustworthy sources Block outgoing messages to specified destinations
What are software packages that allow users to access hypertext and what type of protocol is used to transfer data?
Browsers or web servers, a browser obtains the required resources and organizes them. The web server is on the hypertext document computer. Use HTTP or similar protocols transfer data between web servers and browsers.
Common High-Level Programming Languages
C++ Uses a vocabulary and a set of rules for instructing a computer to perform certain tasks. Python An easy-to-use programming language that does not require a compiler for debugging. JavaScript A programming language designed to enable user engagement with dynamic elements on web pages Tcl Often used in rapid prototyping and the creation of GUIs, Tcl is a simple and compact language but is also very powerful. PHP An all-purpose language that is especially suitable for web development.
What is the minimum grade of network cable required to transmit 1 Gpbs?
Cat 5e
Cloud Applications
Cloud computing offloads infrastructure resource requirements to the cloud service provider by providing processing, storage, databases, networks, software, analytics, and intelligence. Cloud applications, or cloud apps, are software units where cloud-based and local components work together to perform tasks.
What preventative tool acts as an intermediary between a client and a server?
Proxy servers shield the client from adverse actions of the server.
Which type of transmission media can broadcast in baseband mode?
Coax cable can broadcast in both baseband and broadband modes.
Compilers
Compiler translates source code into machine language. Compiler checks source code for errors before translating it into object code. If the source code is found to have errors, the compiler specifies the errors. Errors must be resolved (also known as debugged) before the compiler can successfully recompile the source code. C, C++, C#, and Java programs need compilers to execute.
Bus Network
Computer are connected to a common communication line called bus.
Cloud Computing
Computing offers clients access to shared computers. Amazon's Elastic Compute Cloud rents virtual machines by the hour, regardless of hardware location. Google Cloud and Google Apps let customers build online services without knowing how many computers are running or where data is stored. Security and privacy are issues with cloud computing.
Mesh Topology
Connects every device in a network to every other device. Enables redundancy while also introducing significantly more network traffic.
What is a traditional means of protecting information?
Control access through the use of passwords, However, passwords can be compromised and are of little value when data is transferred over a network. Encryption encodes information to keep it confidential even if the data is stolen.
Network Element Router
Routers are devices that forward messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine
Email software
Send and receive email messages Example Microsoft Outlook Gmail
Off-the-shelf software
Software produced by vendors provides a general set of features that are useful to a broad range of users: businesses, organizations, or individuals. Not customizable; intended to be used as purchased Vendor controlled Functionality: Depends on features Is vendor and community supported Lower cost and usable upon purchase
Application Software
Software that consist of the program that performs tasks specific the machines general purpose. Spreadsheet, database, desktop publishing, accounting, and program development software are all examples of application software.
Operating System
Software that falls into network operating systems or desktop operating systems. 3 most common Operating Systems are Windows, Mac, Linux.
Productivity Software
Software that people use to complete daily tasks such as writing documents, managing personal information, giving presentations, storing data, and sending email.
Device Drivers
Software used by the OS that communicates with controllers or other peripheral devices. Drivers convert general requests into technical steps to complete task. Device drivers are know as middleware, permit hardware-software communication. Installing a print driver is required to print a document. Bluetooth headphones need a driver to listen to music. Some device drivers are automatically installed, while others must be obtained from manufacturers' website.
Graphic Design Software
Create and edit drawings and other artwork Examples: Adobe PhotoShop
Computer-aided design Software
Create blueprints and 3D renderings of buildings and products Examples: AutoCAD
Word processing software
Create business and personal documents such as letters, memos, newsletters, posters, and reports. Examples Microsoft Word Google Docs OpenOffice Writer
Presentation software
Create slides using graphs and simple animations to support presentations Examples Microsoft PowerPoint OpenOffice Impress Google Slides
Spreadsheet software
Create worksheets that perform calculations on financial and statistical data; generating charts, graphs, data visualizations, simple databases, grade books, and invoices Examples Microsoft Excel OpenOffice Calc Google Sheets
Repeaters
Device used to increase network signal strength by extending range of cabling types. If two twisted pair networks are 500 feet apart, a repeater can extend the 300-foot range to 500 feet. Repeaters can be used on fiber and coaxial also
Routers
Devices that connect different networks together, provide internet access. Your LAN router acts as an internet gateway. (This LAN device is also a Gateway.) Routers manage network traffic through a routing table. Messages with unknown destination addresses, the Router will forward the message to another router This analyze, and forward process continues until the message reaches the correct address.
Multimedia software
Display audio, video, image, and text content Examples Real Player VLC Player Media Player
What is the purpose of network vandalism?
Disrupt the system and in other cases, the goal is to gain information.
IP addresses are traditionally written in _____________ notation.
Dotted Decimal Notation.
True or False Data breaches are easy to detect.
False, Data breaches are often very difficult to detect and may go undetected for weeks, months, or possibly even years
Fiber-Optic Cable
Fiber-optic cable reflects light via a glass or plastic core. The core is coated with glass or plastic called cladding. Fiber-optic cables can transmit large volumes of data. Their bandwidth is 26,000 times that of twisted pair cables.
File Management
File managers may group files into directories or folders. Hierarchical file structure is created when directories are placed with other directories. The directory path informs a user where a file is in the system. Folder names separated by slashes create directory paths.
What is a program called that filters traffic passing through a point in the network?
Firewalls block outgoing messages with certain destination addresses or from incoming messages from untrustworthy sources.
Internet Addressing
ICANN assigns ISPs sequential IP addresses. ISPs provide devices in their region unique IP addresses. IPv4 addresses are dotted-decimal. IPv4: 192.207.177.103 Hexadecimal represents IPv6 addresses. 2001:DB8:12:34::1111. Top Level Domain WGU domain is wgu.edu. edu used for educational institutions. Commercial institutions use com government entities use gov nonprofits use org Two-letter country codes like au and kr are TLDs
Tier 2 ISP
ISP is more common and regional in scope. Tier 1 and Tier 2 ISPs are network routers that supply internet infrastructure.
What is Extensible Markup Language (XML)?
Is a standardized language for designing notational systems for representing data as text files. XML emphasizes semantics.
Worm
Is an autonomous software that distributes copies of itself to other devices in a network, damaging individual machines or network operations.
How is a Network defined?
Is considered as a collection of of two or more connected devices that can communicate with one another.
Which network topology best handles downed links without losing connectivity between devices?
Mesh Network provides redundancy from multiple links allows connectivity even when a link is out of service.
Software Licensing
Microsoft and Apple require you to purchase a license to install their operating systems, whether it is for personal or business usage. Further, it is closed-source, meaning they do not permit anybody to modify their operating system code. The operating system is created by Microsoft and Apple. Linux, on the other hand, is open-source and collaborators work together from across the globe. Open-source systems enable people and organizations to open and modify the operating system's kernel, the core of the operating system.
How are hackers able to gain access to systems and data?
More complex and sophisticated social engineering attacks methods are created.
Internet Applications Streaming
Most applications in this category are on-demand streaming, where the end user may view or listen to media at any time. Large-scale streaming services use content delivery networks (CDNs) to stream content to nearby users. Anycast enables an end user to connect to the closest server automatically.
Rainbow tables
Most apps save passwords as scrambled text, or hash values, such "298cde70c32a57b84d0a546fedbb2596." Rainbow tables convert password hash value to plain text.
What is HTML? (Hypertext Markup Language)
It encodes data using special symbols called tags that indicate how a document should look on a screen, what multimedia (music, video, photographs) should accompany it, and which elements are related to other documents. HTML focuses on appearance.
Why do companies need to be diligent about protecting secure data?
It is not uncommon for time to pass before a data breach is even discovered and actions are taken
Programming Languages
Java, C++, and Python are high-level programming languages. Source code is a program's written instructions. Computers cannot run source code. Source code requires a language processor to be translated into machine code.
Kernel
Kernel is the internal part of an Operating System. It contains the OS components that perform basic computer installations functions. The file manager keeps a record of all secondary storage files, including where they're stored, which users have access,and which portions of the storage are available for new files.
Network bandwidth
The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second. CAT 4 - 16mps CAT5 - 100mps CAT5e 1gbps CAT6, Cat6a, Cat 7 - 10gbps
What is Computer Science?
The study of computers and computational systems, it includes hardware, software and people. Computer Science deals with creating and managing applications.
Brute force attack
This is where the attacker uses all possible combinations of characters to learn a user's password. There are multiple variations of the brute force attack, such as rainbow table attack and dictionary attack.
Hybrid software
off-the-shelf software, customized to an organization's needs. Limited control over customization options Can cover all specified business needs, depending on customization Vendor or internally supported Middle Cost Fast implementation when out-of-box features are immediately used and customization is deferred
Tier 1 ISP
Top of the ISP hierarchy, but the least common ISP and considered the Internets backbone. Its high-speed, high-capacity international WANs managed by large communication companies.
Ring Topology
Topology is connected directly to each other as a peer.
Financial Software
Track and manage financial information Examples: Quicken TurboTax
Which actions might be used to support the hardening of the systems you work with?
Use a random password generator and change your passwords frequently. Install security patches as they become available. Maintain an antivirus system.
Internet Applications VoIP
Used for Internet Voice communication, connects two or more devices and sends real time, two way audio data. Softphones lets two or more computers exchange calls without extra hardware. Analog phone adapters digitize and transmit real-time audio data from actual phones.
User Interface
User interface allows end user to communicates with the OS. CLIs connect with end users through textual messaging using a keyboard and monitor. Modern OS have GUI's that allow end users to issue commands via mouse, keyboards, or touch displays. Users may provide instructions through mouse, keyboard, or touch screens using fingers or a stylus. The user interface is vital to a machine's functionality because it connects the user to the operating system. Some operating systems require the user to choose an interface based on preferences, emphasizing the distinction between the user interface and the OS's internal parts.
Utility Software
Utility software extends the capabilities of an operating system. Utility software customizes the OS. Example - Installation utility software performs fundamental computer installation tasks not contained in the OS. Some examples Utility software include software that compresses or decompresses data, plays multimedia, and handles network communications.
What is a data breach?
When Malicious actors try various techniques to gain unauthorized access to data?
Window Shell
backward slash (\) is used to express directory paths; Windows is not case sensitive when searching for files, so capitalization is irrelevant; Windows root directory is referred to by letter, commonly C drive; the user's home directory is found within C:\Users.
Malware (Malicious Software)
is software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). Malware includes computer viruses, worms, spyware, and phishing.
What is the Gnutella protocol?
A protocol that has no centralized server. Allows for several software clients, making it difficult to shut down.
Client/Server Model
A server is a remote computer on the network that provides information or services in response to client requests.
What are protocols?
A set of rules that govern network communications.
Virus
A software program that infects a computer by inserting itself into programs that already reside in the machine. When the "host" software is executed, the virus is also executed, perhaps executing degradations of portions of the operating system, wiping large amounts of data, or corrupting data and other programs.
Algorithm
A step-by-step formula outlining how to execute a task, provides a specifically structured set of inputs required to produce a specific output. An algorithm is a set of well-organized, computer-implemented instructions that solves a problem or performs a calculation.
Spyware
A type of Malware that resides on a computer, collecting information about its activities and reporting back to its instigator. The malicious software can expose passwords and credit card data.
Bespoke software
Ability to customize to meet business needs Owner maintains control of output. Functionality: Covers business needs Internally supported Highest cost Takes long to develop
Tier 3 ISP
Access ISPs are independent Internet's, often called intranets, controlled by a single organization that supply internet access to households and businesses. End systems or hosts connect to access ISP. These include PCs, laptops, cellphones, cameras, cars, and household appliances. End systems are connected to larger networks via various technologies such as telephone lines, cables, and satellites.
Windows Operating System
An operating system, developed by Microsoft Corporation, that provides a graphical interface. Windows XP, 95, 98, Vista, and Windows 10 were previous desktop OSs. Windows is currently closed-source and subscription-based. Windows 10 will continue to be upgraded with new versions. Personal computers typically run Windows. Microsoft products are easy to use.
What detects and removes known viruses from the network?
Antivirus software
Mac Operating System
Apple developed Mac. Snow Leopard, Lion, Mountain Lion, Safari, and Sierra were previous Mac OSs. Apple's OS is closed-source. Media editing and graphic rendering are Mac OS capabilities.
Software Hierarchy
Application and System software, fall under Software. Utility and Operating system fall under System Software. The user interface and Kernel fall under the Operating System.
Transmission Media
Data passes through a network via channels that link network components. Both wired and wireless networks need network media. Wired networks employ twisted pair, coaxial, and optical fiber; wireless networks use radio waves, microwaves, and infrared. Twisted pair cables are often used. Unshielded twisted pair (UTP) and shielded twisted pair are common twisted pair cables (STP). STP cables are more expensive than UTP cables because they feature two insulated copper wires twisted together. Insulating STP cables protects wires from unshielded cables and fluorescent light interference. Twisted pair segment length is 100 cables (328 feet).
Instant messaging software
Enable two or more people to communicate in real time using text Example Google Hangouts Cisco Jabber Facebook Messenger
Entertainment Software
Entertain a specific audience Examples: Spotify iTunes Netflix YouTube Sling
Gaming Software
Entertain the user Examples: World of Warcraft Candy Crush
Distributed Systems
Execute software on more than one computer 3 type: Cluster computing Grid computing Cloud computing
Interpreters
Interpreters translate/execute source code line-by-line. If error is found, the interpreter terminates the process at the error statement and displays an error message. Before continuing, the interpreter must resolve the error. Interpreters convert instructions one statement at a time when the program is run. Perl and Python execute using interpreters.
Memory Management
Memory manager is a kernel component, that handles primary system memory. Single-task computers have minimal memory management.Memory managers undertake various responsibilities when a computer multitasks. The memory manager must discover and assign each process' primary memory space and restrict each process' actions to the allocated memory space. Memory management may page if additional main memory is needed. The additional memory space created in secondary memory by paging is referred to as virtual memory.
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?
Phishing
Video conferencing software
Place and receive video calls among two or more locations Example Adobe Connect GoToMeeting WebEx
Network Element Printer
Printers can reside on networks through the router or a switch, making them accessible to all the other network devices. Printers typically connect to networks via Ethernet but can also useWi-Fi.
Peer-to-peer (P2P) model
Processors request and provide service under this model. P2P includes instant chat and multi-user interactive gaming. Has a decentralized approach that shares resources and responsibilities among many "peer" computers.
Online workplace
Provide an online environment for running cloud-based services and applications Example Office Online Microsoft SharePoint Google Docs
Document storage
Provide private or shareable file storage via cloud-based service Example Microsoft OneDrive Google Drive Dropbox
Medical Software
Provide reference to medical professionals; manage medical practice, including patient data, scheduling, and medical records Examples: MedClarity Kareo
coaxial cable
Shielded & insulated copper wire is used in computer networks and cable TV Fast-capacity transmission systems like
Personal Area Network (PAN)
Short-range network, utilized for headphones to a smartphone or a mouse to a PC.
Fast-capacity transmission systems
Similar to broadband is used to send data, phone, and video across large distances and at high speeds. Radio waves, Coaxial cable & Fiber optic
Local Applications
Software apps stored on individual PCs. Local apps are largely on home computers since they are impracticable for large organizations.
Collaboration Software
Software helps people interact and work together and helps computers share information.
Software Packing
Software may be packaged as: Shareware is time- or function-limited software. Users receive full capability if they buy the app or subscription. Freeware is free. The end-user license agreements (EULA) and copyright laws (where applicable) protect freeware and shareware. This distinguishes freeware, shareware, and public domain software. Public domain software has no EULA or Intellectual Property protections and may be downloaded and used by anybody. In the US, a copyright may restrict unlawful software replication for 35 years. Similar copyright laws may exist elsewhere. Research your country's laws.
System Software
Software performs common computer tasks. System software allows application software to interface with the computer's hardware. System software includes utilities and operating system software. OSs contain user interface and a kernel.
Specialized Software
Software performs specific tasks. CAD, medical, science, finance, gaming, and entertaining use specialized software.
Software Architecture Classification
Target users of application software fall into one of the following three categories: bespoke, off-the-shelf, and hybrid.
Network Element Internet
The Internet (with a capital I) generally refers to the worldwide Internet used by non-technical people. An internet is simply a network of networks used by IT professionals
denial-of-service (DoS) attack
The process of overloading a computer with messages and results in suffocating the network resources.
Which of the following contains the basic functions of the operating system?
The kernel sits at the core of the operating system and manages basic functions such as file management.
Wireless Transmission
Wireless Communication may be easier than cable. Wi-Fi, Bluetooth, and NFC use infrared or radio waves to transmit data. Radio waves connect networked devices. Internet-connected devices such as laptops, tablets, and phones requires Wi-Fi adapters. Each wireless technology has its own send/receive protocols. Different frequencies travel short and long distances. These wireless technologies can deliver data to a Bluetooth speaker, a PC, or a phone using NFC (NFC). Wi-Fi devices may be accessed by devices up to 300 feet, Bluetooth supports distances shorter than 30 feet
Linux shell
a forward slash (/) is used to express directory paths; Linux is case-sensitive; the root directory in Linux is expressed as a single forward slash; most flavors of Linux place the home directory within the /home/.