Networks and the Internet
most common domains:
-.com -.org -.edu -.net -.gov
Which of the following is true about sponsored links?
-Companies have paid Google to display sponsored links -Sponsored links want to sell you something
Which of the following improved networks by increasing speed or by improving the ability for businesses to use networks?
-Ethernet -ISDN -minicomputers -Gigabit Ethernet
Which of the following statements are true of hackers?
-Hackers may have different motivations -Some hackers hack as a form of protest. -Some hackers are network security professionals who want to improve the security of a network by identifying flaws -Some hackers are criminals
Which of the following statements are true of hacking?
-It is the practice of finding weaknesses in a computer or computer network -It is sometimes practiced by network security professionals
Which of the following are true of copyright?
-It protects intellectual property for the life of the author plus seventy years -It protects ideas
Which of the following are true of the trademark?
-It protects the use of a symbol -It associates the item with its maker
Which of the following statements are true?
-Networks are expensive to set up and maintain -Network staff need to keep accurate records on what has been done to a network
How has communication benefitted from Internet use?
-People are more able to easily and quickly communicate with one another -People communicate across long distances in real time
different types of servers
-database servers -communication servers
Accuracy:
A site is usually accurate if you can find the same information in other locations, and if the sources cited on the web page actually support the information. Other clues include correct dates, correct spelling, and the same or similar data in other locations.
Relevance:
Check the dates on the website. They need to be relatively recent. For instance, any websites that have information that is over five years old are not useful if you are looking for information on computers. Look at the way the page is written; if the author seems to only be telling one side of the story, you may want to look elsewhere.
What event in the 1970s contributed to the current state of the Internet?
Computer hardware became more powerful
Why should encryption be used?
Encryption protects sensitive information
Skilled labor:
Greater skills are needed to set up the network. Users need more technical skill than just plugging a cable into a computer's port
Is the use nonprofit/educational or commercial?
If it is not being used to make money, it is more likely to be considered fair use
2. How much of the copyrighted work was used?
If only a little part of the work was used, it is more likely to be considered fair use
Packet-switching was advanced by which of the following people?
Leonard Kleinrock
Equipment sharing
Networks allow people to share printers and scanners within a group
Screen sharing
Networks allow two people in different places to be on the same computer at once. This is beneficial if the people are working on a project together or one of the people needs help.
Mobility:
People can access the Internet from many locations within the broadcast area
Memory storage
People can share storage on a server at their work or school. This storage can be much larger than that on a normal computer. Large files such as movies can be stored and easily accessed on a network
In the following citation, which word is the author's last name? Sachar, Louis. Holes. New York, NY: Farrar,Straus, & Giroux, 1998.
Sachar
What was the original intention for the creation of ARPANET?
Scientists could share information and collaborate
Why did the creation of ARPANET help with this critical need?
Scientists needed a way to work together to share their research and findings
Signal Strength:
The greater the distance between the router and the computing device, the slower the speed
Reliability:
The website must say where the information came from. You should be able to check to see that those sources are real. Also, think about why the person put up the site
Authorization:
Unauthorized users and unwanted intruders access the network more easily
Security: 1
Users can access the Internet with a network password or a subscription to a broadband Internet service
The trademarked name of the accepted standard for configuring wireless networks is
Wi-Fi
When a local wireless router sends the signal it is using
Wi-Fi
Speed:
Wi-Fi and broadband are not as fast as wired connections, although adequate for home networks
What does WLAN stand for?
Wireless Local Area Network
Interference:
Wireless networks have more interference issues than wired networks do. Devices like wireless gaming controls, microwave ovens, fluorescent lights, and electrical connections that are bad can all cause interference
Access:
With broadband, users can connect to the Internet anywhere their devices can receive a signal, as long as the signal is from the Internet service they subscribe to
the National Science Foundation (NSF)
a US government agency concerned with research into science and technology
All networks are connected to the Internet by _______
a backbone
wireless network
a computer network that can be accessed without wires or cables by receiving a short-range radio signal -signal goes through the modem and is broadcast through a wireless router
backup
a copy of all data on a network
1980s
academic researchers and the military continued to increase their use of the Internet -also witnessed the introduction of personal computers (PCs)
Adware
advertising that is embedded in software to pay for applications that users get for free
nondisclosure agreement
agreement states that they will not share any information that would be damaging to the business with people outside of it
Control information
all of the addressing information needed to deliver user data and information for the receiver to make sure that the packet was not corrupted during shipment
Bridge:
allows specific kinds of data into different parts of the network
A wireless mobile device is set up so that it can receive a signal
anywhere its service broadcasts and it can receive a signal
Computers not connecting:
check that switches, routers, and hubs are working, and that configurations are correct
Remote data storage and the ability to access data from any device using the Internet is called
cloud computing
Local Area Network (LAN)
connects all of the computers in one location, such as in a school or a business
hub
connects many different devices and allows them to connect to the network using a single connection -also forwards any packets it receives to all devices connected to it -makes connections with many devices and then connects them to the network with a single port
switch
connects network devices or different parts of a network -sends any packets it receives to only their intended recipients and not to all devices connected to it
The network backbone
connects routers to more efficiently route data
network packet
contains two kinds of information - user data and control information
Robert Kahn
developed the idea for the way that computers would interact with each other over the Internet, known as the Transmission Control Protocol/Internet Protocol (TCP/IP)
It is difficult to pass laws about behavior on the Internet because
different countries have their own laws that govern Internet behavior
hop
each router-to-router leg of the journey
Ethernet
enabled faster and more precise transmission of data
antivirus software
guard against downloading viruses, and most guard against downloading spyware
Firewalls:
help keep out unwanted traffic and intruders - many personal computers also run firewalls to keep intruders like viruses out
Which of the following is the main cause of network failure?
human error
software piracy
if you create a game that users copy without your permission or without paying you
Transmission types
include serial transmission and parallel transmission
Hackers
individuals who practice hacking, are motivated by any of a number of reasons
payload
information sent by a user, such as an e-mail
decryption key
is needed to decode the cipher text
.edu
is reserved for higher education, like a university
If a citation has a volume, title, and page numbers, it is a:
journal article citation
Tim Berners Lee
known as the inventor of the modern Internet -proposed the idea of hypertext as a way to link information across the web -hypertext
Which of the following is a current development in networking?
need for better data storage
Peer-to-peer (P2P)
networks are created between two computers that connect directly to each other
network host
networks are formed by an assortment of computers and devices
Wide Area Networks (WANs)
networks that cover large areas
passive threat
occurs when a person who is not the intended recipient captures data in some way
Spoolers
programs that store data temporarily for processing by another program later -print jobs, for example, are often spooled
Shared resources
refers to information or devices that can be accessed remotely from another computer
Open source
refers to software that exposes its source code for user modification and redistribution. It may or may not be free of cost
File sharing
refers to the practice of allowing someone else to have access to files or computer programs
What did networks of the 1960s use to connect computers?
telephone lines
Hypertext
text in a document that is linked to other information -early networks used hypertext to link research and other information -hypertext is used in the same way over the World Wide Web
Vinton Cerf
was a leader for a group of people who created standards in naming on the Internet -this group is now known as ICANN (the Internet Corporation for Assigned Names and Numbers) -domain name system management
Ethernet
was invented to allow a computer to "listen" to see if the network was clear and data could be sent
.net
was originally reserved for network sites but is now used as a general domain
The Internet Architecture Board (IAB)
was set up in 1979 by the United States Department of Defense's Defense Advanced Research Projects Agency (DARPA) to address the technical and engineering aspects of the growing Internet
Wikis
websites that make it easy for people to collaborate on creations because everyone has the ability to edit the content in this application
cookies
which are small pieces of information that are stored through a user's web browser
quarantine
which means that they are made ineffective
When data is transmitted wirelessly, the computer needs_____ in order to receive it
wireless access technology
Lawrence G. Roberts and Leonard Kleinrock
worked together at the Massachusetts Institute of Technology (MIT) on an early packet-switching idea
network backbone
allows for high-speed connections between major parts of a network -the internet has a backbone that carries data throughout the world
Cloud computing
allows users to store items like photos, videos, music, documents, and even applications in a place they can access using the Internet
Antivirus programs:
also help keep viruses out of the network
online predator
an adult who tries to make friends with young people to abuse them or in some way exploit the "friendship"
Network performance management
an area of network administration that is concerned with how well the network is working
Fair use
an exception to copyright that allows people to use copyrighted works in limited ways without an author's permission
queue
an ordered waiting list of tasks, such as files waiting to be printed
Search results
are a list of web pages that are most relevant to the keywords you searched
Internet Service Providers (ISPs)
are companies that offer Internet service -when people connect to the Internet, they connect to an ISP's computers and network.
Sponsored links
are links that companies paid Google to display when people type those keywords
Secured networks
are network systems that are open only to those with the right credentials
Computer viruses
are programs that copy themselves onto others' computers
Applications
are programs used by these computing devices to let users do all kinds of things, from using calendars and efficiency tools to playing games and reading e-books
Patents
are registered ideas for techniques, inventions, or processes -a person is protected as the owner of the intellectual property
Routing protocols
are rules for how routers communicate with one another and send data
Organic links
are the regular links that appear when you do a search
Unsecured networks
are those that can be accessed by anyone
Which of the following apply to the definition of Wide Area Networks?
-cover large geographic areas -link many networks together -known as WANs
Select all of the things you can do to protect your computer from viruses:
-do not open email attachments from anyone you do not know -install anti-virus software -only share your e-mail address with people you know -label any spam that gets through your e-mail program's spam filter
Which of the following are acceptable to share?
-files that you have permission to share -works that a Creative Commons license says you can use
many network software programs used in network administration:
-firewalls -antivirus programs -Network operating system (NOS)
many common hardware components used in networks:
-gateway -router -hub -bridge -switch
In the future, mobile technologies are expected to be used more than desktop computers today. What other improvements are helping support mobile computing?
-increased data storage online -more applications for mobile phones
Speed of connecting to other people
Instead of sending a letter by mail, people can easily and quickly connect to others using networks. Networks speed up many aspects of social interaction.
Which of the following behaviors should be avoided?
-keeping someone from using the Internet -sharing private information by posting it publicly on the Internet -using a computer at school to play games when someone else needs it for schoolwork
Which of the following are potential consequences of plagiarism?
-loss of a job -damage to one's reputation -getting kicked out of school
The network administrator is important in keeping the network healthy. Which of the following describes the role of a network administrator?
-maintains the telephone and computer networks -documents the network changes
advantages to wireless networks
-mobility -cost -security -access
Which of the following are recent trends?
-more access points -new applications
Which of the following activities have been made possible because of improvements in computer networks?
-organizing the storage of data -accessing the Internet at the same time as other users
Which of the following can be done by a computer virus?
-overwrite a computer hard drive -e-mail themselves to other user e-mail accounts -slow down the computer
Which of the following types of data can be stored using cloud computing?
-photos -movies -documents -music
Select all the activities that can be done online
-play games with friends -work -talk to other people -watch movies
When you cite your sources and give credit to the authors, you are:
-practicing ethical behavior -allowing people to know where you got your ideas -behaving in a scholarly way
Which of the following devices can send or receive information on a network?
-printers -e-book readers -clients -servers -smartphones
Which of the following locations are more likely to have networks that are unsecure?
-public library -airport -public access network
RARA method:
-reliability -accuracy -relevance -authority
With which of the following is network administration concerned?
-security -hardware -software -network setup -network maintenance
Which of the following are considerations in e-commerce and e-government Internet sites?
-security -protection of sensitive information
Guidelines for Ethical Behavior on the Internet
-seeks to gain unauthorized access to the resources of the Internet -disrupts the intended use of the Internet -wastes resources (people, capacity, computer) through such actions -destroys the integrity of computer-based information, and/or -compromises the privacy of users
You have read about the beginnings of the Internet and how it was created. What was the Internet originally created to do?
-share research -communicate -share documents
disadvantages to wireless networking:
-skilled labor -authorization -speed -signal strength -interference
Software as a Service (SaaS) allows users to remotely access which of the following?
-software -data -applications
Which of the following are activities that represent inefficient and/or unethical uses of the Internet?
-taking a break from working by playing an online game -behaving in a way that is unacceptable in person
What are some threats to networks?
-the possibility of data loss -the possibility of viruses -the possibility of a network shut-down
A router sends data
-to the correct computer -where it should go -based on the data's destination
Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services?
-voice -television -Internet -mobile phones
Why do you need to cite your sources?
-you give credit to the original author -you avoid plagiarism
Sergey Brin and Larry Page
made a great contribution by creating a way to get good results from online searches using their expertise in computer science -search engines
Equipment not working:
make sure all equipment is plugged in, turned on, and connected using correct cables and connections
Switch:
makes connections between parts of the network or between the network and devices
Citing your sources
means giving credit to the source where you got your information -if you do not cite your sources, you may be stealing another person's work and ideas, or plagiarizing.
Telecommunications
means the telephones in a company as well as the computer network
Bandwidth
measures how much data can flow through a specific connection at one time -describes the maximum data transfer rate, or capacity, of a network or Internet connection
Communications servers
might handle requests for voice communications
.com
most commonly indicates a business website
.org
most commonly indicates a non-profit organization
wide-area ring backbone
nationwide businesses can have their own dedicated backbone that only carries their data in a point-to-point manner
active threat
occurs when an individual disrupts or captures data from a network
IP address being used by more than one computer:
often fixed by having user log off or shut down and log back on
Social networking
online communication through websites and other web services designed to connect people in social ways
2000s
open source software was developed and released
Gateway:
part of the network that allows communication with other networks
Speed
refers to throughput, which is the actual amount of data that makes it through a connection per second (mbps)
dedupe
remove duplicate information from storage
Trademarks
represent a brand -include logos, slogans, words, phrases, and symbols -can be registered with the government so that they are officially associated with a business or an organization
Lost or damaged network files:
restore files from backup files - backup files should be updated regularly in case of problems
The network backbone is not directly connected to computers. Instead, data goes through the______ first
router
Network operating system (NOS):
runs the network and its software components, such as the firewall and antivirus program -the software used to run a network
Serial transmissions
send data one piece at a time
parallel transmissions
send many pieces at a time
Spyware
sends out information about individuals or their computers without their knowledge
Software as a Service refers to
software you can access using any device
What type of connection did networks use to communicate in the 1960s?
telephone
1990
the Internet had been developed enough that the original framework of the Internet called ARPANET was no longer needed and was taken offline
Fault tolerance
the ability of a network to recover after any type of failure -many networks run "mirror" operations on a separate server to keep the network up and running if there is a failure
Integrated Services Digital Network (ISDN)
the ability to carry voice, as well as data, video, and other network communications at the same time on telephone lines
E-commerce
the ability to do business online -online banking, online shopping, and online financial transactions of other types are known as e-commerce
Plagiarism
the act of taking someone else's writing and passing it off as your own
Troubleshooting
the act of trying to fix what is wrong in a system -a creative problem-solving skill that network administrators need to use regularly
software
the collection of programs that run on hardware
1970s
the computer program, or set of instructions for the computer to follow, was developed so that non-computer scientists could also use computing in their work
client
the computer that uses the service provided by a server
J. C. R. Licklider
the first leader of the computer research program at Defense Advanced Research Project Agency (DARPA) -galactic network
Advanced Research Projects Agency Network (ARPANET)
the first network to connect computers across long distances -created so that scientists could share information and collaborate
Which of the following are considered software piracy?
-burning a music CD to give your friend from a band you both like -copying a program to give to someone else to use -burning a copy of a DVD to sell
Identify the ways to refine your search so that it is more successful
-change your search terms to be more specific -add a keyword that might help make your search more detailed
Which of the following are techniques for maintaining a secure network?
-checking for and installing software updates -regularly backing up data on the network
Which of the following are benefits of using the Internet for communication and work?
-communicating with other people -collaborating on projects -finding people with similar interests
mark all potential problems with using the Internet
-People may not be as truthful online as they would be in face-to-face communication -People may choose the first possible solution to a problem
Which of the following are benefits of using a network?
-People who are far apart can work together -Using a network is a quick way to communicate -Using a network makes sharing information easier -Using a network makes staying in touch with friends easier
Which of the following statements describe characteristics of a secure network?
-Personal information is kept safe -The network is used only by people who are allowed to access it -The network is not compromised
How did the use of ARPANET change computing?
-Scientists were able to communicate over large distances -Scientists could use computers that had different operating systems -Computers no longer had to be wired to a main computer to communicate
Why is spyware more dangerous than adware?
-Spyware tracks users' online behavior -Spyware is an invasion of privacy
Which of the following is a true statement about the online environment?
-The online environment makes it easy for predators to take advantage of young people -It is difficult to know who you are really communicating with online -Stopping online predators is one of the top three priorities of the FBI
Which of the following are efficient ways to use the Internet?
-Use the bookmark function in the browser bar -Know what you are looking for before you start
Which of the following does cloud computing allow users to do?
-access data from anywhere with an Internet connection -store pictures and music -store data
Usually all citations include the following:
-author -year of publication -title of the article -name of the journal -the volume and number (or sometimes the season of the year) of the journal -page numbers where the article can be found
Citing a Journal Source:
-author's last and first name -title -name of the journal -volume, issue number, and pages -publication date
Even though data travels at the speed of light, networks can be slow. What affects the download speed of the network?
-bandwidth -internet connection
Communication
It is easy to share documents, pictures, and other files using a network.
Cost:
It is less expensive because each device no longer needs its own cable
Authority:
It should be apparent who is responsible for the web page. A trustworthy site should be able to tell you why they are a good source of information.
3. Will the use affect the value of the copyrighted work?
If sales of the work are not affected, it is more likely to be considered fair use
Which of the following applies to patents?
They protect the rights of the intellectual property owner
server
a computer that provides special services to client computers on demand -are the computing devices that help connect computers with other parts of a network
router
a device that sends data to the correct destination on a network -reads the information in a network packet and steers the data to its correct destination -router makes sure that requests for information are handled efficiently and correctly -routes data where it should go based on its destination
modem
a device used to connect to the Internet. It translates the signals it receives from the ISP into a form that can be understood by a client computer
Software as a Service (SaaS)
a form of cloud computing -enables more people to use the software
dead link
a link to a web page without any content
Creative Commons
a nonprofit organization that helps creators to determine how people can use their work
network
a set of computers and other peripheral devices, such as printers, that are connected to each other and can communicate with one another -smartphones use computer network connections to access the Internet, and e-book readers use networks to download books
Ethics
a term that is used to describe how to behave in a way that is for the good of everyone
Broadband
a term used to describe any networking technology with a higher bandwidth than older technologies
search engine
a tool for finding information on the web. It finds and stores information about the pages on the web and analyzes the information so it can be searched easily
Star topology
a type of network topology in which all computers are connected in a "star" formation -computers are the arms of the star, and a switch, hub, or other computer is at the center of the star
Peer-to-peer
a type of network topology that does not use a router but shares data directly between computers
IP address
a unique address for a computer on the network
Database servers
house the databases and handle requests for information stored in them
.gov
is for the US government only -those who write these sites must have official authorization
Network security
the group of actions that keep a network safe from potential failures and from attack by intruders
Network administration
the management and maintenance of networks within an organization, such as a school or business
hierarchical addressing scheme
the numbers in the IP address are presented in a particular order based on their locations in the network -the same technique used in area and country codes for telephone numbers
Hardware
the physical equipment itself
Hacking
the practice of finding weaknesses in a computer or computer network
Cloud computing
the practice of storing data, like pictures, video, music, and even programs on servers that can be accessed through a web browser -refers to providing not just storage, but also computing, as a service
cipher text
the resulting text
Copyright
the right to copy or reproduce a song, photograph, movie, or written work -begins as soon as the creator produces the work
Intellectual property
the term for copyrighted creations -what you create on your own, out of your own imagination
E-government
the use of the Internet to keep the public informed about what is going on in their towns and states as well as on a federal level
Network topology
the way a network is laid out or organized, including all the interconnections
Keywords
the words people type into search engines
Encryption
turns text into a form that is nearly impossible for unauthorized computer systems to read
Spam
unwanted communication that comes in many forms
A wired network
uses cables between devices to make a connection