ITEC Final Exam Prep
Packet sniffing
computer hardware device or software program designed to detect and record digital information being transmitted over a network.
ROM(Read Only Memory)
computer hardware that stores programs or data that cannot be added to, modified, or deleted
End User License Agreement. (EULA)
covers a single software item
Malware
designed to steal information, destroy data, and capacity at computer or network, and frustrate the user.
Which of the following are common tasks performed by utility programs?
disk cleanup, file search, system backup and restore
VPN Virtual Private Network
employs a method called tunneling in which each packet from the sending computer is encapsulated within another packet before being sent.
The machine cycle consists of which four steps?
fetch, decode, execute, and store
GUI (Graphical User Interface)
graphically based interface that allows a user to communicate instructions to the computer via typed commands
DSS (decision support system)
helps manager make decisions such as budget planning and new product development
the protocol
https://
URL (Uniform Resource Locator)
https://facebook.com/ninanguyen
Authentication
individual must confirm his or her identity
ISP
internet service providers
Computer platforms
is operating system
Executive Support Software (ESS)
it allows senior management to dill-down into all areas of a business's sales, inventories, production, marketing, and operational databases. They also provide management information for senior managers such as company presidents and chief executive officers.
domain is the
middle portion including .com example: facebook.com
Word Size
number of bits that a computer can process at one time
path is the
part after .COM example: /ninanguyen
System software
programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called
Bluetooth
short-range wireless transmission protocol
Enterprise Resource Planning (ERP)
software allows top management to gain visibility on all aspects of the organization.
Employee monitoring
software is designed to track and record the use of network and hardware resources in the workplace by employees.
Wide area network (WAN)
spans a large physical distance. Internet is largest WAN covering the globe. WAN is a collection of LAN'S. If school has multiple campuses located in different towns, each with its own LAN connecting LANS of each campus by telecommunication lines allows the users of the LANs to communicate.
Bits
the smallest unit of data a computer can process (computer language is binary)
Dial-up Connection
uses the facilities of the public switched telephone network to establish a dialed connection
Types of malware
viruses, worms, and Trojan horses Macro virus
Computer platform Types
windows, mac, android OS, iOS
AUPs (acceptable use policy)
written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners
Local Area network (LAN)
- Collection of computers that are connected in a small geographic area such as an office, college campus, or in your home. - A home network LAN can consist of 2 computers, your TV, video game system, and a shared printer. - Ethernet is the most popular networking standard for LANs.
what's true about troubleshooting network hardware issues.
- Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. - A device that isn't positioned properly can cause weak signals and system issues - If your network isn't working it is a good idea to check the status of the indicator lights
characteristics of a traditional hard drive
- contains platters - contains read/write heads - stores data magnetically
characteristics of an SSD.
- no moving parts - extremely fast
Rank the storage capacities from highest to lowest
1. petabyte 2. terabyte 3. gigabyte 4. megabyte 5. kilobyte
Which three of the following statements are true regarding dual-band routers?
1.Can transmit Wi-Fi signals in the 2.4 GHz frequency range. 2.Can transmit Wi-Fi signals in the 5.0 GHz frequency range. 3.Can minimize the Wi-Fi signal's interference from microwave ovens and car alarms.
Select three true statements regarding persistent cookies.
1.Collect information about the Internet protocol (IP) Address. 2.Collect information about user preferences. 3.Collect password and username information.
bytes
8 bits = 1 byte, every letter, number, or special character on the keyboard is represented by 1 byte
Operating systems (OS)
A computer platform is commonly referred to as manages hardware and software, supports the computer's basic functions, and runs programs
Cybercrimes
A crime in which a computer is the object of the crime or is used to commit a criminal offense.
Black hat hackers
A hacker who uses his or her knowledge to destroy information or for illegal gain.
Firewall
A security system separating 2 networks or even computers on the same network is called a
The internet evolved from a Department of Defense funded project called ________, that attempted to link computers from 4 separate university networks
ARPAnet
Switch IS WHAT
Acts like a traffic signal on a network. Traffic data packets to the nodes their suppose to go to(nodes are on same network). In addition to the NIC, the keep track of the data packets to find their destination
Cyber criminal
Actual individuals committing the crime
Distributed denial service attacks (DDoS)
An automated attack that's launched from more than one zombie computer at the same time. IS A CYBER ATTACK
White hat (ethical) hackers
Breaks into systems for non malicious reasons such as TESTING security vulnerabilities
Types of ISPs
Cable Internet Service. DSL Internet Service Fiber Internet Service Wireless Internet Service Satellite Internet Service
Random Access Memory
Computer has MORE than phone
Switch
Connects devices within a network keeps track of connected devices THROUGH MAC addresses and is usually incorporated in a router
Modem
Converts analog signals into digital signals, and digital signals into analog signals
The DMCA was to create an upload version of ________ laws to deal with the issues of regulating digital material
Copyright
Cyber crime
Criminal ACTION
W3C (World Wide Web Consortium)
Develops recommendations and prototype technologies related to the Web
DMCA
Digital Millennium Copyright Act
Self-driving cars
Google's self driving car AI
Broadband
High-speed internet connection such as cable, satellite, or digital subscriber line (DSL)
HTTP
Hypertext Transfer Protocol
MAC address
Identifies a device within a network
Self-driving trucks may soon be a common sight on interstate highways thanks to pulsed laser tech known as ___:
LIDAR
Artificial Intelligence
Machine learning - the ability of computers to learn without being programmed
electronic (solid state)
NO MOVING PARTS
Select what's true about system software
One of the most important types of system software is the operating system. System software refers to programs that offer the structure and hardware control necessary to run the computer and its peripheral devices
Linux OS
Open source Free and open-source software that can be used and modified by anyone. Most common OS on servers, mainframes and supercomputers. The underlying OS for most video game consoles and embedded computers as well as the underlying software for the Android OS. Open source software that can be modified by users and is very secure. Free to download and use. Less susceptible to viruses.
Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.
Overclocking
Pharming
PLANTING malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.
Word processing software
Pages for Mac, Google docs, Microsoft Word
Intellectual property
Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form. Human knowledge.
Professional
Rootkits
Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.
RAM
Random Access Memory RAM stores data and allows the computer to load information quicker as it remembers it. CLEARED WHEN DEVICE POWERS OFF
Dash replenishment service
Remember anything amazon related
Data from the hard drive reaches the CPU ___ than data from the RAM.
Slower
Applets
Small application programs that are often utility programs that perform less complex operational functions.
Management Information Systems (MIS)
Software that assists managers by improving efficiency and effectiveness.
Viruses are Designed to:
Steal information Destroy data Incapacitate a computer or network Frustrate the user
Clock speed and clock rate ?
THEY are the same
Zombies
The computer controlled by a hacker. (ONE person)
Router
The device that connects 2 networks and often provides firewall protection is a
Phishing
The process of SENDING e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.
IP addresses
The router identification (kind of like an address to the router specifically)
Firewire
Thunderbolt port, commonly found on older Apple computers
Maintenance type tasks can be executed using ______ that are included with most operating systems
Utility programs
Security protocols for Wi-Fi networks
WEP (Original) WPA (second short lived) WPA2 (CURRENT security protocol for WIFI!)
Buses
Where data flows between different parts of the computer (BUS=Tunnel for Data)
WWW - what is it
World Wide Web Created by Tim Berners-Lee at CERN
Server relationship
a computer that provides resource and services to client computers that requests them (large scheme!)
Client relationship
a computer that requests resources such as a web page, spreadsheet, image file, or services from another computer on a network (small scheme!)
Copyright protection
a legal concept that grants rights and control to the owner of any published work
TPS (Transaction Processing System)
a transaction processing system is an organizations basic accounting and record keeping system
Cache
addition to the RAM, modern processors temporarily keep frequently accessed data
Bus width
amount of data that can be transmitted over a channel at a given time
File Transfer Protocol (FTP)
application transfer protocol that is used to copy file from 1 computer to another
Productivity software
apps designed to make individuals or businesses more efficient ex: iWork, Google Docs, Office
Botnets
are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks. (LARGE ORGANIZATION)
Cookies
are used to analyze and measure traffic on a web page
Two main components of a processor are
arithmetic logic unit (ALU) control unit (CU)
The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.
clock
Two major factors that impact processor speed are
clock speed & bus width
Three common Internet transmission media.
coaxial cable, telephone wire, cell phone radio waves
Supply Chain Management Software. SCMS
combines the capability of transaction processing systems (TPS) software with the forecasting of decision support system (DSS) software to help businesses manage inventories efficiently
single-core processor
comprised of one control unit and one ALU