Exam 2 CIS

Ace your homework & exams now with Quizwiz!

transmission control protocol/Internet protocol (TCP/IP

(204) A widely used Internet protocol. The essential features of this involve identifying sending and receiving devices and breaking into small parts, or packets, for transmission across the Internet.

https (hypertext transfer protocol secure

(204) Becoming widely used to protect the transfer of sensitive information.

domain name server (DNS

(204) Converts text based addresses to IP addresses.

global positioning system (GPS

(199) A network of satellites owned and managed by the department of defense that continuously sends location information to earth. Many devices use this information to uniquely determine the geographic location of the device.

WiMax (Worldwide Interoperability for Microwave Access

(199) A new standard that extends the range of Wi-Fi networks using microwave connections.

LTE (Long Term Evolution

(199) One of the newest wireless standards. It promises to provide greater speed and quality transmissions in the near future.

fiber-optic service (FiOS

(201) A new technology and not widely available. Current providers include Google and Verizon with speeds faster than DSL or cable connections.

4G (fourth-generation mobile telecommunications

(202) It has begun to replace 3G networks in some areas with providers using WiMax and LTE connections to provide faster transmission speeds.

network operating system (NOS

(206) Control and coordinate the activities of all computers and other devices on a network.

network interface card (NIC

(206) Expansion cards located within the system unit that connect a computer to a network.

local area network (LAN

(206) Networks with nodes that are within close physical proximity to each other.

wireless LAN (WLAN

(207) A wireless local access network is typically referred to as this. It uses radio frequencies to connect computers and other devices.

keystroke logger (230

A type of computer monitoring software record every activity and keystroke made on your computer system.

Ethernet (207

It is a LAN standard.

password (236

Secret words or phrases that must be keyed into a computer system to gain access.

spam (38

Unwanted and unsolicited e-mails.

https (hypertext transfer protocol secure

(238)An Internet protocol that adds another level of protection to http.

uniform resource locator (URL

(32) The address or location for browsers to connect to the Internet.

Internet service provider (ISP

(32) This is the most common way to access the Internet. The providers are already connected to the Internet and provide a path or connection for users to access the Internet.

Hypertext Markup Language (HTML

(33) A markup language for displaying web pages. The browser interprets instructions from this to display a web page.

top-level domain (TLD

(33) This is the last part of the domain name following the dot (.), also known as the web suffix. This usually identifies the type of organization.

file transfer protocol (FTP

(35) Allows you to efficiently copy files across the Internet.

virus (232

A program that migrates through networks and operating systems, and most attach themselves to different programs and databases.

malware (232

A short term for malicious software.

wiki (42

A website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.

switch (206

Central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.

*privacy [Accuracy, property, access] *security *ethics

Most concerns of the internet are

cybercrime (232

Any criminal offense that involves a computer and a network.

node (205

Any device that is connected to a network. It could be a computer, printer, or data storage device.

big data (225

An ever growing volume of digitally stored data.

wide area network (WAN

(208) Are countrywide and worldwide networks. These networks provide access to regional service providers and typically span distances greater than 100 miles.

virtual private network (VPN

(213) Create a secure, private connection between a remote user and an organization's internal network.

Family Educational Rights and Privacy Act (FERPA

(231) Restricts disclosure of educational records.

http (hypertext transfer protocol

(238) The most widely used Internet protocol for website encryption.

http (hypertext transfer protocol

(204) A widely used protocol used for web traffic.

IP address (Internet protocol address

(204) Every computer on the Internet has a unique numeric address called this. It is used by the Internet to deliver e-mail and locate websites.

WPA2 (Wi-Fi Protected Access 2

(238) The most widely used wireless network encryption for home wireless networks.

business-to-business (B2B

(45) commerce involves from one business to another, typically a manufacturer-supplier relationship.

business-to-consumer (B2C

(45) commerce involves sales from businesses to the general public. It is the fastest growing type. Three of the most widely used applications are online banking, financial trading, and shopping.

history file (228

The locations or addresses of sites that you have recently visited.

Information resellers/brokers

data gathers create electronic profiles

phishing (234

A technique often employed by scammers, it attempts to trick individuals into thinking that a fake website or e-mail is legitamate by replicating it.

tree network (210

A central node is connected to subordinate nodes.

computer network (205

A communication system that connects two or more computers so that they exchange information and share resources. They can be set up in different arrangements to meet user's needs.

cracker (232

A computer criminal who creates and distributes malicious programs.

first-party cookie (228

A cookie that is generated and read only by the website you are currently visiting.

third-party cookie (228

A cookie usually generated by an advertising company that is affiliated with the website you are currently visiting to keep track of your web activity as you move from one site to the next.

Private Browsing (229

A feature provided by Safari to ensure that your browsing activity is not recorded onto the computer's hard disk.

coaxial cable (198

A high frequency transmission cable, it replaces multiple wires of telephone lines with a single solid-copper wire.

copyright (241

A legal concept that gives content creators the right to control use and distribution of their work.

bandwidth (202

A measurement of the width or capacity of the communication channel. It means how much information can move across the communication channel in a given amount of time.

router (206

A node that forwards or routes data packets from one network to their destination in another network.

client (205

A node that requests or uses resources available from other nodes. Typically, it is a user's personal computer.

hacker (231

A person who gains unauthorized access to a computer that contain another's personal information.

firewall (236

Acts as a security buffer between a corporation's private network and all external newtorks, including the

backbone (209

Also known as a bus, all communications travel along this bus. Each device is connected to this common cable.

host (206

Any computer system that can be accessed over a network.

streaming (42

Audio and video files continuously downloaded while you are listening and/or viewing the file content.

packet (204

Broken down and reformatted parts of information that is sent or transmitted across the Internet and travels through numerous interconnected networks.

zombie (233

Computers infected by a worm, virus, or trojan horse that allows them to be remotelly controlled for malicious purposes.

extranet (211

Connects to more than one organization; typically allows suppliers and other limited access to their networks.

firewall (212

Consists of hardware and software that control access to a company's intranet and other internal networks.

twisted-pair cable (198

Consists of pairs of copper wires that are twisted together.

antispyware (230

Designed to detect and remove various types of privacy threats.

biometric scanning (235

Devices such as fingerprint and eye scanners.

star network (209

Each device is connected directly to a central network switch. Most common type today.

domain name (33

It comes after the protocol, but before the web suffix. It indicates where the specific address where the resource is located.

Internet (28

Launched in 1969 with ARPANE, it consists of the actual physical network.

hyperlink (33

Links that connect to other documents containing related information - text files, audio, video clips, and graphic images.

mesh network (210

Newest; Each node has two or more connecting nodes.

browser (32

are programs that provide access to web resources.

data security (238

Protecting software and data from unathorized tampering or damage.

security suites (236

Provides a collection of utility programs designed to protect your privacy.

identity theft (234

The illegal assumption of someone's identity for the purposes of economic benefit.

wireless access point (207

Through this, all communication pass through the network's centrally located wireless access point or base station.

plagiarism (242

Representing someelse's ideas and works as our own without giving credit to the orginal source.

cookies (228

Small data files that are deposited on your hard disks by websites you have visited.

search engine (43

Specialized programs that assist you in locating information on the web and the Internet.

ethics (241

Standard of moral conduct.

Freedom of Information Act (227

Under this law, you are entitled to look at your records held by government agencies.

e-commerce (44

The buying or selling of goods over the Internet.

spyware (230

The most dangerous form of privacy threat that describes a wide range of programs designed to secretly record and report and individual's activities on the Internet.

encryption (236

The process of coding information to make it unreadable except to those who have a special piece of information known as an encrpytion key.

software piracy (241

The unauthorized copy and/or distribution of software.

cyberbullying (235

The use of Internet, cell phones, or other devices to send or post content intended to hurt or embarass another person.

virus (38

These are computer viruses or destructive programs and are often attached to spam e-mail.

protocol (204

They are rules for exchanging data between computers.

protocol (33

They are rules for exchanging data between computers. Ex: http is used for web traffic and is the most widely used one.

satellite connection service (202

They use satellites to provide wireless connections. While slower than DSL or cable modems, they are available almost anywhere using a satellite-receiving disk.

topology (209

This describes the physical arrangement of a network.

broadband (202

Widely used for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use this for high speed data transfer.

baseband (202

Widely used to connect individual computers that are located close to one another. It is able to support high speed transmission.

hotspot (208

Wireless access points that provide Internet access and are widely available in public places. They typically use Wi-Fi technology.

denial of service (DoS

attack (233) Attempts to slow down or stop a computer system or network by flooding a computer or network with requests of information for that data.

client/server network (210

central computers coordinate and supply services to other nodes.

peer-to-peer (P2P

network (211) Nodes have equal authority and act as both clients and servers; widely used to share games, movies, and music over the Internet. Easy to set up and use, lack security controls.

intranet (211

private network within an organization; uses browsers, websites, and web pages. Typical applications include electronic telephone, directories, e-mail addresses, employee benefit information, internal job offerings, and much more.

Trojan horse (233

programs that appear to be harmless; however, they contain malicious programs.

worm (232

programs that simply replicate themselves over and over again.


Related study sets

Filosofia Platone - LCDA - 2016 3C

View Set

American Studies- Jacob Riis & How the Other Half Lives

View Set

Entrepreneurship and Starting a small business

View Set