Intro to IT Unit 4 & Unit 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Network Element Tablet Computer

A a portable computer typically with touch screen display and a rechargeable battery in a thin and flat design. Typically, it connects to a network via Wi-Fi.

Network Element Smartphone

A cellular device with an operating system and the ability to run third -party applications. They connect to networks using cellular wireless frequencies or Wi-Fi on local network

Network Element Server

A computer that provides services, such as website hosting and routing, for other devices

Bridge

A device that links and manage multiple networks. Ex. The device connects coaxial and twisted-pair networks. The bridge only bridges the network if a message is directed to another device.

Network Element Modem

A devices that bridges between the customer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet

What is the World Wide Web (WWW) composed of?

A hypertext document format for embedding hyperlinks to other documents, a protocol for transferring hypertext over the network, and a server process that supplies hypertext pages upon request. WWW now supports photos, audio and video.

Grid Computing

A loosely coupled distributed system that completes large tasks. Computing uses specialized software to distribute data and workload between computers in the grid.

Network Element Switch

A network device that extends the network by using packet switching to forward data to the intended hard-wired devices.

Network Element Laptop

A personal computer device that is portable with a folding design. It includes an integrated flat screen, a keyboard with a mouse, and usually, a battery. It can also contain a CDROM, DVD-ROM, as well as various other devices such as SD card readers, Wi-Fi, Bluetooth,etcetera. Laptops typically connect to networks via Wi-Fi or Ethernet

Language Processors

Language processors are sometimes considered system software. Early machine languages and high-level programming languages are still commonly used. Assembly language is machine-dependent, yet mnemonics, that are being used to represent instructions are not directly understandable by machine and high-level language as machine-independent. Machine code is computer language (i.e., in the form of 0s and 1s).

Linux Operating System

Linux is open-source operating system software. Many versions of Linux: Linux mint, Mandrake, Fedora, Ubuntu, Debian and CenOS. These OSs are free. However Red Hat and Cisco are vendors that offer Linux-based operating systems with added service and hardware costs.

Personal information managers

Manage contracts, calendars, tasks, notes, and reminders Examples Microsoft Outlook Google Calendar

Scientific Software

Manage the process of doing scientific research Examples: LabVIEW MATLAB

Phishing

Spoofing technique that seeks for confidential information. The perpetrator sends fraudulent business emails requesting information.

Database software

Store and manage data, develop data-driven reports, and provide electronic filing Examples Microsoft Access Microsoft SQL Server MySQL

Switches

Switches manage network messages to reduce LAN traffic. Older devices broadcast all messages to LAN. On a 100-device network, a switch would transmit just one message. This example would reduce traffic by 98%.

Cluster Computing

System employs numerous independent computers to perform computation or services equivalent to a larger machine. Several inexpensive machines can perform like a supercomputer. Provides high availability to at least one computer, can answer a request when others are down using. Automatically distribute requests among members to balance loads.

What monitors network behaviors such as the origin and volume of traffic?

Network auditing software, looks for anomalies to mitigate unwanted occurrences proactively or reactively.

Star Network

Network has a single device serving as a central point to which all other are connected.

Wide Area Network (WAN)

Network links a systems over a greater distance, including machines on the opposite sides of the world.

Local Area Network (LAN)

Network of computers in one building. Can be connected to create a larger network and become Wide Area Networks (WAN). Connected networks may boost company communication and effectiveness.

Internet Applications

Network protocols are rules and procedures that manage device communication securely and fast across a network. As servers and browsers improved, Web sites handled were handled by (HTTP). Online communication includes IM, browser-based chat, Twitter, and email. Simple Mail Transfer Protocol supports email transmission. SMTP uses DNS lookups to identify the email recipient and sends the message to a mail server, where it may be accessed via POP3 and IMAP (Internet Message Access Protocol).

Packet sniffing

Also referred to as a man-in-the-middle (MITM) attack, where the attacker intercepts the data as it is traveling to or from the victim's device, including authentication credentials. MITM is just one way an attacker can get unauthorized access to resources and systems.

Operating Systems Users

An OS protects computer resources from unauthorized users. Each user on a shared computer has their own account. An operating system user account has a name, password, and user privileges (e.g., administrator vs. standard user). OS utilizes log-in information to control system and resource access. Accounts are established by the administrator, who is called a superuser or root accounts. When a user logs in with the proper credentials, the operating system can be accessed. Administrators can change settings, modify software, and do other task denied to other users.

Dictionary attack

Attack is performed by the attacker by using an application and a large dictionary text file with just words. When the attacker runs the application it tries identifying the password by trying hundreds or thousands of words per minute from that dictionary file.

Why do companies do not like to publicize malicious data attacks and data breach events?

Attacks could impact their reputation and revenue, so it is difficult to find out about them.

What is the tool used to encode a document while focusing on appearance known as?

HTML (HyperText Markup Language)

Who is Tim Berners-Lee?

He developed the concept of hyperlinking in the 1980s, resulting to the World Wide Web.

baseband transmission

Baseband is a narrow-band transmission that carries data or information. LANs and serial cables

What is the role of a firewall?

Block incoming messages from untrustworthy sources Block outgoing messages to specified destinations

What are software packages that allow users to access hypertext and what type of protocol is used to transfer data?

Browsers or web servers, a browser obtains the required resources and organizes them. The web server is on the hypertext document computer. Use HTTP or similar protocols transfer data between web servers and browsers.

Common High-Level Programming Languages

C++ Uses a vocabulary and a set of rules for instructing a computer to perform certain tasks. Python An easy-to-use programming language that does not require a compiler for debugging. JavaScript A programming language designed to enable user engagement with dynamic elements on web pages Tcl Often used in rapid prototyping and the creation of GUIs, Tcl is a simple and compact language but is also very powerful. PHP An all-purpose language that is especially suitable for web development.

What is the minimum grade of network cable required to transmit 1 Gpbs?

Cat 5e

Cloud Applications

Cloud computing offloads infrastructure resource requirements to the cloud service provider by providing processing, storage, databases, networks, software, analytics, and intelligence. Cloud applications, or cloud apps, are software units where cloud-based and local components work together to perform tasks.

What preventative tool acts as an intermediary between a client and a server?

Proxy servers shield the client from adverse actions of the server.

Which type of transmission media can broadcast in baseband mode?

Coax cable can broadcast in both baseband and broadband modes.

Compilers

Compiler translates source code into machine language. Compiler checks source code for errors before translating it into object code. If the source code is found to have errors, the compiler specifies the errors. Errors must be resolved (also known as debugged) before the compiler can successfully recompile the source code. C, C++, C#, and Java programs need compilers to execute.

Bus Network

Computer are connected to a common communication line called bus.

Cloud Computing

Computing offers clients access to shared computers. Amazon's Elastic Compute Cloud rents virtual machines by the hour, regardless of hardware location. Google Cloud and Google Apps let customers build online services without knowing how many computers are running or where data is stored. Security and privacy are issues with cloud computing.

Mesh Topology

Connects every device in a network to every other device. Enables redundancy while also introducing significantly more network traffic.

What is a traditional means of protecting information?

Control access through the use of passwords, However, passwords can be compromised and are of little value when data is transferred over a network. Encryption encodes information to keep it confidential even if the data is stolen.

Network Element Router

Routers are devices that forward messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine

Email software

Send and receive email messages Example Microsoft Outlook Gmail

Off-the-shelf software

Software produced by vendors provides a general set of features that are useful to a broad range of users: businesses, organizations, or individuals. Not customizable; intended to be used as purchased Vendor controlled Functionality: Depends on features Is vendor and community supported Lower cost and usable upon purchase

Application Software

Software that consist of the program that performs tasks specific the machines general purpose. Spreadsheet, database, desktop publishing, accounting, and program development software are all examples of application software.

Operating System

Software that falls into network operating systems or desktop operating systems. 3 most common Operating Systems are Windows, Mac, Linux.

Productivity Software

Software that people use to complete daily tasks such as writing documents, managing personal information, giving presentations, storing data, and sending email.

Device Drivers

Software used by the OS that communicates with controllers or other peripheral devices. Drivers convert general requests into technical steps to complete task. Device drivers are know as middleware, permit hardware-software communication. Installing a print driver is required to print a document. Bluetooth headphones need a driver to listen to music. Some device drivers are automatically installed, while others must be obtained from manufacturers' website.

Graphic Design Software

Create and edit drawings and other artwork Examples: Adobe PhotoShop

Computer-aided design Software

Create blueprints and 3D renderings of buildings and products Examples: AutoCAD

Word processing software

Create business and personal documents such as letters, memos, newsletters, posters, and reports. Examples Microsoft Word Google Docs OpenOffice Writer

Presentation software

Create slides using graphs and simple animations to support presentations Examples Microsoft PowerPoint OpenOffice Impress Google Slides

Spreadsheet software

Create worksheets that perform calculations on financial and statistical data; generating charts, graphs, data visualizations, simple databases, grade books, and invoices Examples Microsoft Excel OpenOffice Calc Google Sheets

Repeaters

Device used to increase network signal strength by extending range of cabling types. If two twisted pair networks are 500 feet apart, a repeater can extend the 300-foot range to 500 feet. Repeaters can be used on fiber and coaxial also

Routers

Devices that connect different networks together, provide internet access. Your LAN router acts as an internet gateway. (This LAN device is also a Gateway.) Routers manage network traffic through a routing table. Messages with unknown destination addresses, the Router will forward the message to another router This analyze, and forward process continues until the message reaches the correct address.

Multimedia software

Display audio, video, image, and text content Examples Real Player VLC Player Media Player

What is the purpose of network vandalism?

Disrupt the system and in other cases, the goal is to gain information.

IP addresses are traditionally written in _____________ notation.

Dotted Decimal Notation.

True or False Data breaches are easy to detect.

False, Data breaches are often very difficult to detect and may go undetected for weeks, months, or possibly even years

Fiber-Optic Cable

Fiber-optic cable reflects light via a glass or plastic core. The core is coated with glass or plastic called cladding. Fiber-optic cables can transmit large volumes of data. Their bandwidth is 26,000 times that of twisted pair cables.

File Management

File managers may group files into directories or folders. Hierarchical file structure is created when directories are placed with other directories. The directory path informs a user where a file is in the system. Folder names separated by slashes create directory paths.

What is a program called that filters traffic passing through a point in the network?

Firewalls block outgoing messages with certain destination addresses or from incoming messages from untrustworthy sources.

Internet Addressing

ICANN assigns ISPs sequential IP addresses. ISPs provide devices in their region unique IP addresses. IPv4 addresses are dotted-decimal. IPv4: 192.207.177.103 Hexadecimal represents IPv6 addresses. 2001:DB8:12:34::1111. Top Level Domain WGU domain is wgu.edu. edu used for educational institutions. Commercial institutions use com government entities use gov nonprofits use org Two-letter country codes like au and kr are TLDs

Tier 2 ISP

ISP is more common and regional in scope. Tier 1 and Tier 2 ISPs are network routers that supply internet infrastructure.

What is Extensible Markup Language (XML)?

Is a standardized language for designing notational systems for representing data as text files. XML emphasizes semantics.

Worm

Is an autonomous software that distributes copies of itself to other devices in a network, damaging individual machines or network operations.

How is a Network defined?

Is considered as a collection of of two or more connected devices that can communicate with one another.

Which network topology best handles downed links without losing connectivity between devices?

Mesh Network provides redundancy from multiple links allows connectivity even when a link is out of service.

Software Licensing

Microsoft and Apple require you to purchase a license to install their operating systems, whether it is for personal or business usage. Further, it is closed-source, meaning they do not permit anybody to modify their operating system code. The operating system is created by Microsoft and Apple. Linux, on the other hand, is open-source and collaborators work together from across the globe. Open-source systems enable people and organizations to open and modify the operating system's kernel, the core of the operating system.

How are hackers able to gain access to systems and data?

More complex and sophisticated social engineering attacks methods are created.

Internet Applications Streaming

Most applications in this category are on-demand streaming, where the end user may view or listen to media at any time. Large-scale streaming services use content delivery networks (CDNs) to stream content to nearby users. Anycast enables an end user to connect to the closest server automatically.

Rainbow tables

Most apps save passwords as scrambled text, or hash values, such "298cde70c32a57b84d0a546fedbb2596." Rainbow tables convert password hash value to plain text.

What is HTML? (Hypertext Markup Language)

It encodes data using special symbols called tags that indicate how a document should look on a screen, what multimedia (music, video, photographs) should accompany it, and which elements are related to other documents. HTML focuses on appearance.

Why do companies need to be diligent about protecting secure data?

It is not uncommon for time to pass before a data breach is even discovered and actions are taken

Programming Languages

Java, C++, and Python are high-level programming languages. Source code is a program's written instructions. Computers cannot run source code. Source code requires a language processor to be translated into machine code.

Kernel

Kernel is the internal part of an Operating System. It contains the OS components that perform basic computer installations functions. The file manager keeps a record of all secondary storage files, including where they're stored, which users have access,and which portions of the storage are available for new files.

Network bandwidth

The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second. CAT 4 - 16mps CAT5 - 100mps CAT5e 1gbps CAT6, Cat6a, Cat 7 - 10gbps

What is Computer Science?

The study of computers and computational systems, it includes hardware, software and people. Computer Science deals with creating and managing applications.

Brute force attack

This is where the attacker uses all possible combinations of characters to learn a user's password. There are multiple variations of the brute force attack, such as rainbow table attack and dictionary attack.

Hybrid software

off-the-shelf software, customized to an organization's needs. Limited control over customization options Can cover all specified business needs, depending on customization Vendor or internally supported Middle Cost Fast implementation when out-of-box features are immediately used and customization is deferred

Tier 1 ISP

Top of the ISP hierarchy, but the least common ISP and considered the Internets backbone. Its high-speed, high-capacity international WANs managed by large communication companies.

Ring Topology

Topology is connected directly to each other as a peer.

Financial Software

Track and manage financial information Examples: Quicken TurboTax

Which actions might be used to support the hardening of the systems you work with?

Use a random password generator and change your passwords frequently. Install security patches as they become available. Maintain an antivirus system.

Internet Applications VoIP

Used for Internet Voice communication, connects two or more devices and sends real time, two way audio data. Softphones lets two or more computers exchange calls without extra hardware. Analog phone adapters digitize and transmit real-time audio data from actual phones.

User Interface

User interface allows end user to communicates with the OS. CLIs connect with end users through textual messaging using a keyboard and monitor. Modern OS have GUI's that allow end users to issue commands via mouse, keyboards, or touch displays. Users may provide instructions through mouse, keyboard, or touch screens using fingers or a stylus. The user interface is vital to a machine's functionality because it connects the user to the operating system. Some operating systems require the user to choose an interface based on preferences, emphasizing the distinction between the user interface and the OS's internal parts.

Utility Software

Utility software extends the capabilities of an operating system. Utility software customizes the OS. Example - Installation utility software performs fundamental computer installation tasks not contained in the OS. Some examples Utility software include software that compresses or decompresses data, plays multimedia, and handles network communications.

What is a data breach?

When Malicious actors try various techniques to gain unauthorized access to data?

Window Shell

backward slash (\) is used to express directory paths; Windows is not case sensitive when searching for files, so capitalization is irrelevant; Windows root directory is referred to by letter, commonly C drive; the user's home directory is found within C:\Users.

Malware (Malicious Software)

is software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). Malware includes computer viruses, worms, spyware, and phishing.

What is the Gnutella protocol?

A protocol that has no centralized server. Allows for several software clients, making it difficult to shut down.

Client/Server Model

A server is a remote computer on the network that provides information or services in response to client requests.

What are protocols?

A set of rules that govern network communications.

Virus

A software program that infects a computer by inserting itself into programs that already reside in the machine. When the "host" software is executed, the virus is also executed, perhaps executing degradations of portions of the operating system, wiping large amounts of data, or corrupting data and other programs.

Algorithm

A step-by-step formula outlining how to execute a task, provides a specifically structured set of inputs required to produce a specific output. An algorithm is a set of well-organized, computer-implemented instructions that solves a problem or performs a calculation.

Spyware

A type of Malware that resides on a computer, collecting information about its activities and reporting back to its instigator. The malicious software can expose passwords and credit card data.

Bespoke software

Ability to customize to meet business needs Owner maintains control of output. Functionality: Covers business needs Internally supported Highest cost Takes long to develop

Tier 3 ISP

Access ISPs are independent Internet's, often called intranets, controlled by a single organization that supply internet access to households and businesses. End systems or hosts connect to access ISP. These include PCs, laptops, cellphones, cameras, cars, and household appliances. End systems are connected to larger networks via various technologies such as telephone lines, cables, and satellites.

Windows Operating System

An operating system, developed by Microsoft Corporation, that provides a graphical interface. Windows XP, 95, 98, Vista, and Windows 10 were previous desktop OSs. Windows is currently closed-source and subscription-based. Windows 10 will continue to be upgraded with new versions. Personal computers typically run Windows. Microsoft products are easy to use.

What detects and removes known viruses from the network?

Antivirus software

Mac Operating System

Apple developed Mac. Snow Leopard, Lion, Mountain Lion, Safari, and Sierra were previous Mac OSs. Apple's OS is closed-source. Media editing and graphic rendering are Mac OS capabilities.

Software Hierarchy

Application and System software, fall under Software. Utility and Operating system fall under System Software. The user interface and Kernel fall under the Operating System.

Transmission Media

Data passes through a network via channels that link network components. Both wired and wireless networks need network media. Wired networks employ twisted pair, coaxial, and optical fiber; wireless networks use radio waves, microwaves, and infrared. Twisted pair cables are often used. Unshielded twisted pair (UTP) and shielded twisted pair are common twisted pair cables (STP). STP cables are more expensive than UTP cables because they feature two insulated copper wires twisted together. Insulating STP cables protects wires from unshielded cables and fluorescent light interference. Twisted pair segment length is 100 cables (328 feet).

Instant messaging software

Enable two or more people to communicate in real time using text Example Google Hangouts Cisco Jabber Facebook Messenger

Entertainment Software

Entertain a specific audience Examples: Spotify iTunes Netflix YouTube Sling

Gaming Software

Entertain the user Examples: World of Warcraft Candy Crush

Distributed Systems

Execute software on more than one computer 3 type: Cluster computing Grid computing Cloud computing

Interpreters

Interpreters translate/execute source code line-by-line. If error is found, the interpreter terminates the process at the error statement and displays an error message. Before continuing, the interpreter must resolve the error. Interpreters convert instructions one statement at a time when the program is run. Perl and Python execute using interpreters.

Memory Management

Memory manager is a kernel component, that handles primary system memory. Single-task computers have minimal memory management.Memory managers undertake various responsibilities when a computer multitasks. The memory manager must discover and assign each process' primary memory space and restrict each process' actions to the allocated memory space. Memory management may page if additional main memory is needed. The additional memory space created in secondary memory by paging is referred to as virtual memory.

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?

Phishing

Video conferencing software

Place and receive video calls among two or more locations Example Adobe Connect GoToMeeting WebEx

Network Element Printer

Printers can reside on networks through the router or a switch, making them accessible to all the other network devices. Printers typically connect to networks via Ethernet but can also useWi-Fi.

Peer-to-peer (P2P) model

Processors request and provide service under this model. P2P includes instant chat and multi-user interactive gaming. Has a decentralized approach that shares resources and responsibilities among many "peer" computers.

Online workplace

Provide an online environment for running cloud-based services and applications Example Office Online Microsoft SharePoint Google Docs

Document storage

Provide private or shareable file storage via cloud-based service Example Microsoft OneDrive Google Drive Dropbox

Medical Software

Provide reference to medical professionals; manage medical practice, including patient data, scheduling, and medical records Examples: MedClarity Kareo

coaxial cable

Shielded & insulated copper wire is used in computer networks and cable TV Fast-capacity transmission systems like

Personal Area Network (PAN)

Short-range network, utilized for headphones to a smartphone or a mouse to a PC.

Fast-capacity transmission systems

Similar to broadband is used to send data, phone, and video across large distances and at high speeds. Radio waves, Coaxial cable & Fiber optic

Local Applications

Software apps stored on individual PCs. Local apps are largely on home computers since they are impracticable for large organizations.

Collaboration Software

Software helps people interact and work together and helps computers share information.

Software Packing

Software may be packaged as: Shareware is time- or function-limited software. Users receive full capability if they buy the app or subscription. Freeware is free. The end-user license agreements (EULA) and copyright laws (where applicable) protect freeware and shareware. This distinguishes freeware, shareware, and public domain software. Public domain software has no EULA or Intellectual Property protections and may be downloaded and used by anybody. In the US, a copyright may restrict unlawful software replication for 35 years. Similar copyright laws may exist elsewhere. Research your country's laws.

System Software

Software performs common computer tasks. System software allows application software to interface with the computer's hardware. System software includes utilities and operating system software. OSs contain user interface and a kernel.

Specialized Software

Software performs specific tasks. CAD, medical, science, finance, gaming, and entertaining use specialized software.

Software Architecture Classification

Target users of application software fall into one of the following three categories: bespoke, off-the-shelf, and hybrid.

Network Element Internet

The Internet (with a capital I) generally refers to the worldwide Internet used by non-technical people. An internet is simply a network of networks used by IT professionals

denial-of-service (DoS) attack

The process of overloading a computer with messages and results in suffocating the network resources.

Which of the following contains the basic functions of the operating system?

The kernel sits at the core of the operating system and manages basic functions such as file management.

Wireless Transmission

Wireless Communication may be easier than cable. Wi-Fi, Bluetooth, and NFC use infrared or radio waves to transmit data. Radio waves connect networked devices. Internet-connected devices such as laptops, tablets, and phones requires Wi-Fi adapters. Each wireless technology has its own send/receive protocols. Different frequencies travel short and long distances. These wireless technologies can deliver data to a Bluetooth speaker, a PC, or a phone using NFC (NFC). Wi-Fi devices may be accessed by devices up to 300 feet, Bluetooth supports distances shorter than 30 feet

Linux shell

a forward slash (/) is used to express directory paths; Linux is case-sensitive; the root directory in Linux is expressed as a single forward slash; most flavors of Linux place the home directory within the /home/.


Kaugnay na mga set ng pag-aaral

stroke pathophysiology & treatment

View Set

MGMT 310 exam 2 topcoat, and quizzes

View Set

chapter 4 test: sensation and perception

View Set

AP Psychology Chapter 8: Development Across the Life Span

View Set