unit 3 networks and the internet:

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In order for the US to keep up with the advancements of other countries, __________ was created to lead computing research, which then led to the creation of the first wide area network.

ARPA

The technology and techniques that can be used to control who has access to a computer system.

Access Control

Software that defends against spyware and adware.

Anti-Spyware Software

Software that defends against malware (viruses, worms, and trojan horses).

Anti-Virus Software

Identifies users by scanning for one or more physical traits.

Biometric Reader

Blogs and social networking websites such as Facebook, Twitter, Instagram, SoundCloud, and YouTube are places where children sometimes share too much information — not only names and addresses, but also personal photos that sometimes show illegal acts, such as underage drinking. Minors should be instructed to share their blogs or online profiles with a parent or guardian so content can be filtered for appropriateness. You can also use Google, along with the search tools on social networking sites, to search for profiles your child may have posted. Use your child's full name, phone number, and other identifying information.

Blogs and Social Networking

Transmission standard that provides the protocol for mobile devices, computers, or smartphones to connect to communicate.

Bluetooth

A network device that connects two networks together

Bridge

Short for Children' Internet Protection Act; requires public schools and organizations block or filter pictures that may be obscene or pornographic in nature.

CIPA

Short for Children's Online Privacy Protection Act; requires parental consent before collecting information from people under thirteen years old.

COPPA

usually refers to online bullying of children and teenagers, but anyone can be a victim. Those who would bully others face-to-face are likely to bully others online as well.

Cyberbullying

Online harassment that usually involves the communication of threats online through social media, forums, email, and message boards. Cyberstalking is similar to cyberbullying, but the main difference is that cyberstalkers are unusually obsessed with their victims, and seek to collect any information about them.

Cyberstalking

Converts the request between IP addresses and domain names.

Domain Name Service (DNS)

The standard interface for all wired networks.

Ethernet

An attack that uses a vulnerability to harm a system.

Exploit

A LAN that can be accessed by users with special access rights outside of a businesses or organization.

Extranet

HTML markup code enclosed in < > brackets; used to define how content is displayed on screen.

HTML Tag

The Web is a network of HTML documents supported by the __________ network protocol.

HTTP

Link to a web page or other type of content.

Hyperlinks

Programming language used to create websites.

Hypertext Markup Language (HTML)

Networking protocol used to distribute websites.

Hypertext Transfer Protocol (HTTP)

Short for Internet Protocol address; numeric address that provides an ID number for a computer on a network.

IP Address

Term used to describe posting text messages, videos, and photos that may be inappropriate for certain situations or age groups, i.e., children, professional situations.

Inappropriate Content

Global network of smaller networks linking devices through TCP/IP.

Internet

Private network that can only be accessed by users with special permission and is typically set up in a private company or organization.

Intranet

Records keystrokes in a file and sends the file to the author of the program.

Keystroke Logger

A computer network that links computers within a building.

Local Area Network (LAN)

Computer network that links computers within a building.

Local Area Network (LAN)

Malicious software used to launch attacks on a computer system.

Malware

Malicious software used to launch attacks on a computer system. Some attacks include malicious software that is designed to steal personal information from users; examples of malware include Trojan horses, worms, and viruses.

Malware

A network within a large confined area such as a college campus, or company within in urban or suburban area.

Metropolitan Area Network (MAN)

Set communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone.

Near-Field Communication (NFC)

Group of people or devices connected for the sole purpose of sharing data or resources.

Network

Translates instructions from the operating system into data that can be sent over a network.

Network Adapter

Peer-to-peer (P2P) file sharing invites new privacy problems. These types of programs allow people to browse and download files from Internet-connected personal computers of anyone else who uses the same program. This makes it easy for cybercriminals to spread viruses, Trojan horses, and spyware. Children can also accidentally download inappropriate content, such as pornography, that is labeled misleadingly.

Peer to Peer (P2P) File Sharing Software

A smaller local network in which personal devices are in close range with one another.

Personal Area Network (PAN)

Scam in which a user is tricked into providing personal information. Usually involves an email, website, or online form that appears to be from a legitimate source (bank, government institution, etc.) soliciting a user for personal information.

Phishing

Format or rule for transmitting data between devices.

Protocol

The process of converting a domain name to an IP address.

Resolve

An upper tier switch that can connect and route network local network traffic as well as traffic from outside networks such as the Internet.

Router

An upper tier switch that can connect and route network local network traffic, as well as traffic from outside networks such as the Internet.

Router

Plastic card that contains a microchip that a card reader can scan to verify a person's identity.

Smart Card

Computer networking concept that separates the software from the hardware, making it easier to innovate and adapt the network to quickly meet changing network demands.

Software-Defined Networking (SDN)

Transmission Control Protocol/Internet Protocol; a group of protocols that functions together for web-based communication.

TCP/IP

An application that appears to do something useful while secretly causing damage to your computer system.

Trojan Horse

Address of an internet resource such as a website; must begin with a communication protocol such as HTTP.

Uniform Resource Locator (URL)

Computer code that inserts itself into an executable file.

Virus

Document written in HTML format that contains content prepared for the web.

Web Page

As websites are the primary vehicle through which information is delivered online, children must be shown how important it is to protect their personal information and the information of their family and friends. Many child-oriented websites solicit information from kids in surveys and forms in exchange for prizes, and get them to register online for fan clubs. In chat rooms, sharing their gender, age, and favorite hangout could seem harmless, but predators can easily use this information to locate and harass the child. Predators may even masquerade as children in order to gather information, and ultimately meet their unsuspecting victims. With websites and chatrooms, the potential does exist for kids to pretend to be older than they actually are, not thinking about the potential results of such actions.Chatrooms and online forums are typically where children get into online fights or become the target of bullying via email, chat, and instant messaging.

Web Sites and Chat Rooms

A group of interconnected web pages with a system for navigation through all of the pages.

Website

_________ is a type of PAN or LAN that takes an internet signal and converts it to radio waves.

Wi-Fi

Method of wireless encryption that offers capabilities for a large wireless network.

Wi-Fi Protected Access (WPA)

A computer network with all of the equipment spread over a large geographic and is typically inclusive of many small networks or LANs.

Wide Area Network (WAN)

Computer network with all of the equipment spread over a large geographic area, and is typically inclusive of many small networks or LANs.

Wide Area Network (WAN)

Commonly used method of network encryption; controlled by entering in a 128 bit or 256 bit key.

Wired Equivalent Privacy (WEP)

Network that uses physical cables and connection boxes to connect devices.

Wired Network

Wireless network connection box that enables computers on a network to connect wirelessly.

Wireless Access Point (WAP)

The standard interface technology for wireless networks.

Wireless Fidelity (Wi-Fi)

Network that uses radio frequency signals to transmit data.

Wireless Network

An interconnected network of documents written in Hypertext Markup Language (HTML) that can be accessed through the Hypertext Transfer Protocol (HTTP).

World Wide Web

An application that carries harmful programs such as a trojan horse or virus.

Worm

A group of computers connected for the purpose of communication-sharing of data and resources.

computer network

Every device on a network must have a __________, either built into the motherboard or attached as a peripheral, that will manage in/outbound network requests and translate instructions from the operating system into information that can be sent over the network.

network adapter

The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication.

web-based

A __________ is a type of malware that can carry a virus through an email attachment and be either active or passive.

worm


Kaugnay na mga set ng pag-aaral

BLY-213 Microbiology Chapter 5 assignment

View Set

Chapter 14 Practice Quizzes: BA 370

View Set

MedSurg Chapter 69: Management of Patients With Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set

Chapter 7 study guide for infection control

View Set

NUR 114 PrepU Week 6-7 Ch. 20, 27, 3, 10

View Set