Intro to Computer Applications-Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Misleading but real looking email that tricks users into revealing personal or account info when they reply or follow enclosed links to fake reproductions of popular websites

(Spear) Phishing

Router

A device that forwards data packets along networks and is connected to at least two networks is called a

Cable modem (from cabel company)-fastest DSL-cheaper and provides other services often like cloud

DSL/Cable

Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device.

Network topology (bus, ring, star, mesh)

Cloud computing in which the services for cloud computing are provided for only one organization/entity. a infrastructure is maintained for a specific organization needing to access information stored there

Private Cloud

A smart city is an urban development vision to integrate multiple information and communication technology (ICT) and Internet of things (IoT) solutions in a secure fashion to manage a city's assets - the city's assets include, but are not limited to, local departments' information systems, schools, libraries, transportation systems, hospitals, power plants, water supply networks, waste management, law enforcement, and other community services

Smart City

2B

The base 10 number 43 is represented as ___ in Hexadecimal.

The Internet

The word "cloud" in cloud computing represents what?

Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN).

VOIP

Hidde inside legit documents, media, files, and software Make copies of itself Tries sto infect other computers nad dvices Example: iloveyou,sircam,conflickr

Viruses

Cloud Computing depends on Internet Connections

Which of the following is a disadvantage of Cloud Computing?

(0,0,0) (255,255,255) (255,0,0)

A common configuration for representing colors is RGB with color representations from ____ to _____ . The color RED is represented by what triplet of values? _____ . Enter the values in parentheses separated by commas, no spaces.

Infographic

A visual image such as a chart or diagram used to represent information or data is called a(n) ______ .

an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building application software. In general terms, it's a set of clearly defined methods of communication between various software components. A good API makes it easier to develop a computer program by providing all the building blocks, which are then put together by the programmer. An API may be for a web-based system, operating system, database system, computer hardware, or software library. An API specification can take many forms, but often includes specifications for routines, data structures, object classes, variables, or remote calls. POSIX, Microsoft Windows API, the C++ Standard Template Library, and Java APIs are examples of different forms of APIs. Documentation for the API is usually provided to facilitate usage. The status of APIs in intellectual property law is controversial.

API

20

According to the video Paradigm Shifts in Software, every ___ years in the software business, we get a paradigm shift.

...Asynchronous transmission is the transmission of data in which each character is a self-contained unit with its own start and stop bits and an uneven interval between them. Asynchronous transmission is also referred to as start/stop transmission.

Asynchronous transmission

a measurement of network speed-how much data passed ina given amound (15-150Mbps). bandwidth is the bit-rate of available or consumed information capacity expressed typically in metric multiples of bits per second. Variously, bandwidth may be characterized as network bandwidth, data bandwidth, or digital bandwidth

Bandwidth

High speed internet connections

Broadband

central servers provide infor data resources to other nodes/workstations (clients). A client-server network is a central computer, also known as a server, which hosts data and other forms of resources. Clients such as laptops and desktop computers contact the server and request to use data or share its other resources with it.. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected.

Client-server network

Backing up data by storing a copy of data online

Cloud Backup

Using the internet to store/access data/programs rather than storing/accessing data on the hard drive. . Cloud can be used in different ways 3 ways companies can provide services through the cloud Paas-Patform as a service: provides software development environment where applications can be built and deployed. Virtul servers and operating systems Iaas-Infrastructure as service: rent access to hardware (serers, storage you can use as needed to support your business Saas-Software as service: using oftware that is not on your harddrive but rather is on remote servers usable by other across the itnernet Players in cloud Google docs & drive Apple iCloud-automatic file syncing across devices Microsoft 365-ccloudbased version of microsoft program DropBox, Box [Each of these are Saas] Benefits of cloud Not need to buy has much hardware, i uses the internet, great for collaborations-simultaneous documents edting from various places Negaties: Data ownership?-who owns the info Privacy-does cloud ompany wach your behavior Security-is ino you placee there safe from outside parties stealing it Advertising-do you have to putup with a lot of ads and sales pitches as you access the info? Adwarre: software provider makes money by selling screen space o time to marketer

Cloud Computing

Cloud collaboration is a way of sharing and co-authoring computer files through the use of cloud computing, whereby documents are uploaded to a central "cloud" for storage, where they can then be accessed by others.

Collaboration

179

Convert the binary number 10110011 to base 10

small files placed on computer system as we use the web. benefit -if you go to the same website repeatedly, they can keep track of where you were and what you entered into the website ex rememebr the address you put in the website etc. negative- the cookies keep track of your behavior.....other sites like advertising could look at your cookies and modifying the cookies to you

Cookie

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

DNS

Denial of service attack DOS-flood networks, routers, servers and sites with more packets than they can hanle-interfering with normal operation Flood networks, routers, servers and sites with more packers that they can handle -- interfering with normal operation

Denial of Service attack DOS

-depending on your viewpoint, much of what has occured already and will continue to occur may be eneficial to individuals and even society as a whole -bt not everyone benefirs f for social and ecomomic reasons, they do not have access tot he same technological resources and advancements [not everyone gets the benefit of internet access]

Digital Divide

...A drone, in a technological context, is an unmanned aircraft. Drones are more formally known as unmanned aerial vehicles (UAVs) or unmanned aircraft systems (UASes). Essentially, a drone is a flying robot. The aircrafts may be remotely controlled or can fly autonomously through software-controlled flight plans in their embedded systems working in conjunction with onboard sensors and GPS.

Drone

...elasticity is defined as "the degree to which a system is able to adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible

Elasticity

...In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor.

Encryption

...Google Apps is a set of web applications provided by Google. These web applications include Google Email, Google Calendar, Google Docs, Google Talk (Chat), Google Mobile and Google Sites. ... Thus you can look at Google Apps as an online office suite.

Google Apps

Html is the underlying language describing what a webpage looks like. <b> is the symbol for bold in html HyperText Markup Language (HTML) is the standard markup language for creating web pages and web applications. With Cascading Style Sheets (CSS), and JavaScript, it forms a triad of cornerstone technologies for the World Wide Web.[1] Web browsers receive HTML documents from a webserver or from local storage and render them into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document.

HTML

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext.

HTTP (Hypertext Transfer Protocol)

HTTPS (also called HTTP over TLS, HTTP over SSL, and HTTP Secure) is a protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data.

HTTPS

A type of nefarious internet activity

Hacking

Uses a combination of both private and public cloud computing. multiple internal and external cloud providers within one infrastructure

Hybrid Cloud

8

I byte = ___ bits. (Enter numerical answer)

The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members." The IEEE fosters the development of standards that often become national and international standards. The organization publishes a number of journals, has many local chapters, and several large societies in special areas, such as the IEEE Computer Society.

IEEE (Instiute of Electrical and Electronics Engineers)

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP). It is an open standards organization, with no formal membership or membership requirements.

IETF

IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

IMAP

An Internet Protocol (IP) address is a unique number assigned to every device on a network. Just as a street address determines where a letter should be delivered, an IP address identifies computers on the Internet. Network devices use IP addresses to communicate with each other. When a device is assigned a static IP address, the address does not change. Most devices use dynamic IP addresses, which are assigned by the network when they connect and change over time.

IP Address: static/dynamic

...A: IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly to IPv4 in that it provides the unique, numerical IP addresses necessary for Internet-enabled devices to communicate. However, it does sport one major difference: it utilizes 128-bit addresses.

IPv6 and IPv4

Infrastructure as a service (IaaS) is a standardized, highly automated offering, where compute resources, complemented by storage and networking capabilities are owned and hosted by a service provider and offered to customers on-demand. Customers are able to self-provision this infrastructure, using a Web-based graphical user interface that serves as an IT operations management console for the overall environment. API access to the infrastructure may also be offered as an option.

IaaS

The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols.

Internet

SaaS

Internet email and Google docs are popular models for

the delay before a transfer of data begins following an instruction for its transfer.

Latency

A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

MAN (Metropolitan area network)

A- SaaS C- PaaS B- IaaS

Match each category (layer) of cloud computing to its description. A. Applications hosted on a remote server and accessed over the Interenet B. provide off-site server, storage, networking hardware which are rented and accessed over the Internet. C. offers services for developing and deploying applications over the Internet, such as virtualized servers and operating systems. _____ SaaS _____ PaaS _____ IaaS

Meta tags are snippets of text that describe a page's content; the meta tags don't appear on the page itself, but only in the page's code. We all know tags from blog culture, and meta tags are more or less the same thing, little content descriptors that help tell search engines what a web page is about.

Meta tag

...In communication networks, a node (Latin nodus, 'knot') is either a redistribution point (e.g. data communications equipment), or a communication endpoint (e.g. data terminal equipment).

Nodes

Main Frame Computing, Client-Server Computing, Cloud Computing

Order the following computing paradigms chronologically (oldest first): Main Frame Computing, Cloud Computing, Client-Server Computing

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991

PGP

Platform as a service (PaaS) offers services for developing and deploying applications over the Internet, such as virtualized servers and operating systems. Platform as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

PaaS

each computer can directly supply resources nfo et o all other computers on the network. Much of the internet is peer-to-peer. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Peer-to-peer network

Hacking technique whereby domain name servers are secretly modified to redirect users to fake, or "spoofed" version of real websites

Pharming

rules governing how data is transferred. Packets:TCP/IP Email: SMTP(simple mail transfer protol), IMAP[shows what messages are there-transfers message to device-but doesn't remove it from the server....doesn't show a copy on the computer it just shows you on the screen and saves it on the server], POP [transfer email completely and doesn't keep anything of it] Fire Transfer(file transfer protocol):FTP, SFTP (Secure) Web Pages: HTTP(hyper text transfer protocol) Security: SSL/TSL-used to securely transfer internet info email web etc safely and privately

Protocol

Type of cloud computing in which the services of cloud computing is provided for the general public. computing resources are dynamically provisioned over the Internet

Public Cloud

Privat keys-not shared. Used to descramble the code Public keys-shared with oothers Encryption involves both types of keys Mathematically based-currently encyption is unbreakable Sender uses receivers publuc key t encrypt the message/info but only receiver can decrypt it since their private key is necessary to accoplish this To break the code would take years, maybe centuries. It uses very large prime numbers

Public key encryption

RCS, originally called Radio Computing Services, is a provider of scheduling and broadcast software for radio, Internet and television stations.

Radio

...SFTP, which stands for SSH File Transfer Protocol, or Secure File Transfer Protocol, is a separate protocol packaged with SSH that works in a similar way over a secure connection.

SFTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP.

SMTP

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.[1] Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, instant messaging, and voice-over-IP (VoIP). Websites use TLS to secure all communications between their servers and web browsers.

SSL/TSL

Software as a service (SaaS Applications hosted on a remote server and accessed over the Interenet. its a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.

SaaS

...Scalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.[1] For example, it can refer to the capability of a system to increase its total output under an increased load when resources (typically hardware) are added. An analogous meaning is implied when the word is used in an economic context, where scalability of a company implies that the underlying business model offers the potential for economic growth within the company.

Scalability

Rutgers implementation of Google Apps

Scarlet Apps

Packet-switched networks move data in separate, small blocks -- packets -- based on the destination address in each packet. When received, packets are reassembled in the proper sequence to make up the message. Circuit-switched networks require dedicated point-to-point connections during calls. Circuit-switched networks and packet-switched networks have traditionally occupied different spaces within corporations. Circuit-switched networks were used for phone calls and packet-switched networks handled data. But because of the reach of phone lines and the efficiency and low cost of data networks, the two technologies have shared chores for years.

Switching techniques: circuit/packet

Synchronous transmission is a data transfer method which is characterized by a continuous stream of data in the form of signals which are accompanied by regular timing signals which are generated by some external clocking mechanism meant to ensure that both the sender and receiver are synchronized with each other.

Synchronous transmission

True

True or False: Cloud computing may be public or private.

...An unmanned aerial vehicle (UAV), commonly known as a drone, unmanned aircraft system (UAS), or by several other names, is an aircraft without a human pilot aboard.

UAV

The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.

WWW (World Wide Web)

A Web crawler, sometimes called a spider, is an Internet bot which systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering). Web search engines and some other sites use Web crawling or spidering software to update their web content or indices of others sites' web content. Web crawlers can copy all the pages they visit for later processing by a search engine which indexes the downloaded pages so the users can search much more efficiently. Crawlers consume resources on the systems they visit and often visit sites without tacit approval. Issues of schedule, load, and "politeness" come into play when large collections of pages are accessed. Mechanisms exist for public sites not wishing to be crawled to make this known to the crawling agent. For instance, including a robots.txt file can request bots to index only parts of a website, or nothing at all.

Web crawlers (or spiders)

1,2,4

Which of the following are considered peripherals? (Choose all that apply.) 1. Printer 2. Microprocessor 3. CD ROM Drive 4. Scanner


संबंधित स्टडी सेट्स

C475 Terminology Competencies 6-9

View Set

PHYS2002 Cumulative Final Exam Conceptual Questions

View Set

Chapter 48: Skin Integrity and Wounds and Chapter 45: Nutrition

View Set