Exam 2 CIS
transmission control protocol/Internet protocol (TCP/IP
(204) A widely used Internet protocol. The essential features of this involve identifying sending and receiving devices and breaking into small parts, or packets, for transmission across the Internet.
https (hypertext transfer protocol secure
(204) Becoming widely used to protect the transfer of sensitive information.
domain name server (DNS
(204) Converts text based addresses to IP addresses.
global positioning system (GPS
(199) A network of satellites owned and managed by the department of defense that continuously sends location information to earth. Many devices use this information to uniquely determine the geographic location of the device.
WiMax (Worldwide Interoperability for Microwave Access
(199) A new standard that extends the range of Wi-Fi networks using microwave connections.
LTE (Long Term Evolution
(199) One of the newest wireless standards. It promises to provide greater speed and quality transmissions in the near future.
fiber-optic service (FiOS
(201) A new technology and not widely available. Current providers include Google and Verizon with speeds faster than DSL or cable connections.
4G (fourth-generation mobile telecommunications
(202) It has begun to replace 3G networks in some areas with providers using WiMax and LTE connections to provide faster transmission speeds.
network operating system (NOS
(206) Control and coordinate the activities of all computers and other devices on a network.
network interface card (NIC
(206) Expansion cards located within the system unit that connect a computer to a network.
local area network (LAN
(206) Networks with nodes that are within close physical proximity to each other.
wireless LAN (WLAN
(207) A wireless local access network is typically referred to as this. It uses radio frequencies to connect computers and other devices.
keystroke logger (230
A type of computer monitoring software record every activity and keystroke made on your computer system.
Ethernet (207
It is a LAN standard.
password (236
Secret words or phrases that must be keyed into a computer system to gain access.
spam (38
Unwanted and unsolicited e-mails.
https (hypertext transfer protocol secure
(238)An Internet protocol that adds another level of protection to http.
uniform resource locator (URL
(32) The address or location for browsers to connect to the Internet.
Internet service provider (ISP
(32) This is the most common way to access the Internet. The providers are already connected to the Internet and provide a path or connection for users to access the Internet.
Hypertext Markup Language (HTML
(33) A markup language for displaying web pages. The browser interprets instructions from this to display a web page.
top-level domain (TLD
(33) This is the last part of the domain name following the dot (.), also known as the web suffix. This usually identifies the type of organization.
file transfer protocol (FTP
(35) Allows you to efficiently copy files across the Internet.
virus (232
A program that migrates through networks and operating systems, and most attach themselves to different programs and databases.
malware (232
A short term for malicious software.
wiki (42
A website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.
switch (206
Central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.
*privacy [Accuracy, property, access] *security *ethics
Most concerns of the internet are
cybercrime (232
Any criminal offense that involves a computer and a network.
node (205
Any device that is connected to a network. It could be a computer, printer, or data storage device.
big data (225
An ever growing volume of digitally stored data.
wide area network (WAN
(208) Are countrywide and worldwide networks. These networks provide access to regional service providers and typically span distances greater than 100 miles.
virtual private network (VPN
(213) Create a secure, private connection between a remote user and an organization's internal network.
Family Educational Rights and Privacy Act (FERPA
(231) Restricts disclosure of educational records.
http (hypertext transfer protocol
(238) The most widely used Internet protocol for website encryption.
http (hypertext transfer protocol
(204) A widely used protocol used for web traffic.
IP address (Internet protocol address
(204) Every computer on the Internet has a unique numeric address called this. It is used by the Internet to deliver e-mail and locate websites.
WPA2 (Wi-Fi Protected Access 2
(238) The most widely used wireless network encryption for home wireless networks.
business-to-business (B2B
(45) commerce involves from one business to another, typically a manufacturer-supplier relationship.
business-to-consumer (B2C
(45) commerce involves sales from businesses to the general public. It is the fastest growing type. Three of the most widely used applications are online banking, financial trading, and shopping.
history file (228
The locations or addresses of sites that you have recently visited.
Information resellers/brokers
data gathers create electronic profiles
phishing (234
A technique often employed by scammers, it attempts to trick individuals into thinking that a fake website or e-mail is legitamate by replicating it.
tree network (210
A central node is connected to subordinate nodes.
computer network (205
A communication system that connects two or more computers so that they exchange information and share resources. They can be set up in different arrangements to meet user's needs.
cracker (232
A computer criminal who creates and distributes malicious programs.
first-party cookie (228
A cookie that is generated and read only by the website you are currently visiting.
third-party cookie (228
A cookie usually generated by an advertising company that is affiliated with the website you are currently visiting to keep track of your web activity as you move from one site to the next.
Private Browsing (229
A feature provided by Safari to ensure that your browsing activity is not recorded onto the computer's hard disk.
coaxial cable (198
A high frequency transmission cable, it replaces multiple wires of telephone lines with a single solid-copper wire.
copyright (241
A legal concept that gives content creators the right to control use and distribution of their work.
bandwidth (202
A measurement of the width or capacity of the communication channel. It means how much information can move across the communication channel in a given amount of time.
router (206
A node that forwards or routes data packets from one network to their destination in another network.
client (205
A node that requests or uses resources available from other nodes. Typically, it is a user's personal computer.
hacker (231
A person who gains unauthorized access to a computer that contain another's personal information.
firewall (236
Acts as a security buffer between a corporation's private network and all external newtorks, including the
backbone (209
Also known as a bus, all communications travel along this bus. Each device is connected to this common cable.
host (206
Any computer system that can be accessed over a network.
streaming (42
Audio and video files continuously downloaded while you are listening and/or viewing the file content.
packet (204
Broken down and reformatted parts of information that is sent or transmitted across the Internet and travels through numerous interconnected networks.
zombie (233
Computers infected by a worm, virus, or trojan horse that allows them to be remotelly controlled for malicious purposes.
extranet (211
Connects to more than one organization; typically allows suppliers and other limited access to their networks.
firewall (212
Consists of hardware and software that control access to a company's intranet and other internal networks.
twisted-pair cable (198
Consists of pairs of copper wires that are twisted together.
antispyware (230
Designed to detect and remove various types of privacy threats.
biometric scanning (235
Devices such as fingerprint and eye scanners.
star network (209
Each device is connected directly to a central network switch. Most common type today.
domain name (33
It comes after the protocol, but before the web suffix. It indicates where the specific address where the resource is located.
Internet (28
Launched in 1969 with ARPANE, it consists of the actual physical network.
hyperlink (33
Links that connect to other documents containing related information - text files, audio, video clips, and graphic images.
mesh network (210
Newest; Each node has two or more connecting nodes.
browser (32
are programs that provide access to web resources.
data security (238
Protecting software and data from unathorized tampering or damage.
security suites (236
Provides a collection of utility programs designed to protect your privacy.
identity theft (234
The illegal assumption of someone's identity for the purposes of economic benefit.
wireless access point (207
Through this, all communication pass through the network's centrally located wireless access point or base station.
plagiarism (242
Representing someelse's ideas and works as our own without giving credit to the orginal source.
cookies (228
Small data files that are deposited on your hard disks by websites you have visited.
search engine (43
Specialized programs that assist you in locating information on the web and the Internet.
ethics (241
Standard of moral conduct.
Freedom of Information Act (227
Under this law, you are entitled to look at your records held by government agencies.
e-commerce (44
The buying or selling of goods over the Internet.
spyware (230
The most dangerous form of privacy threat that describes a wide range of programs designed to secretly record and report and individual's activities on the Internet.
encryption (236
The process of coding information to make it unreadable except to those who have a special piece of information known as an encrpytion key.
software piracy (241
The unauthorized copy and/or distribution of software.
cyberbullying (235
The use of Internet, cell phones, or other devices to send or post content intended to hurt or embarass another person.
virus (38
These are computer viruses or destructive programs and are often attached to spam e-mail.
protocol (204
They are rules for exchanging data between computers.
protocol (33
They are rules for exchanging data between computers. Ex: http is used for web traffic and is the most widely used one.
satellite connection service (202
They use satellites to provide wireless connections. While slower than DSL or cable modems, they are available almost anywhere using a satellite-receiving disk.
topology (209
This describes the physical arrangement of a network.
broadband (202
Widely used for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use this for high speed data transfer.
baseband (202
Widely used to connect individual computers that are located close to one another. It is able to support high speed transmission.
hotspot (208
Wireless access points that provide Internet access and are widely available in public places. They typically use Wi-Fi technology.
denial of service (DoS
attack (233) Attempts to slow down or stop a computer system or network by flooding a computer or network with requests of information for that data.
client/server network (210
central computers coordinate and supply services to other nodes.
peer-to-peer (P2P
network (211) Nodes have equal authority and act as both clients and servers; widely used to share games, movies, and music over the Internet. Easy to set up and use, lack security controls.
intranet (211
private network within an organization; uses browsers, websites, and web pages. Typical applications include electronic telephone, directories, e-mail addresses, employee benefit information, internal job offerings, and much more.
Trojan horse (233
programs that appear to be harmless; however, they contain malicious programs.
worm (232
programs that simply replicate themselves over and over again.