Intro to IT C182 - Unit 4 Computer Networks

Ace your homework & exams now with Quizwiz!

What is the role of a firewall? (Select all that apply.)

- Block outgoing messages to specified destinations - Block incoming messages from untrustworthy sources

Which actions might be used to support the hardening of the systems you work with? (Select all that apply.)

- Maintain an antivirus system - Install security patches as they become available - Use a random password generator and change your passwords frequently

What is the tool used to encode a document while focusing on appearance known as?

HTML (Hypertext markup language)

What is the minimum grade of network cable required to transmit 1 Gpbs?

CAT5e

Which tool resides between the client and server to protect the client from adverse actions of the server?

Proxy server

What are the different types of distributed systems?

Cluster computing, Grid computing, Cloud computing

Which type of transmission media can broadcast in baseband mode?

Coax cable

True or False Data breaches are easy to detect.

False

The devices in Mei's office are interconnected in which type of network?

LAN

Client/Server Model:

The basic roles played by the processes are categorized as either a client making requests or a server satisfying client requests

Personal Area Network (PAN):

normally used for short-range communications, within a few feet, such as wireless headphones to a smartphone or a wireless mouse to a PC

Phishing:

obtain private information by simply asking for it. The perpetrator sends emails posing as a legitimate business asking for information.

Ring Network:

onnect directly to each other as a peer

VoIP (Voice over Internet Protocol):

operates by establishing a connection between two devices and then performing real-time, two-way transmission of audio data.

Peer-to-Peer (P2P):

processers both request and provide service to each other. Instant messaging and interactive games played by users on multiple machines

Cloud Computing:

provides large pools of shared computers that can be allocated to clients as needed

What are the common network media used in wireless networks?

radio waves, microwaves, and infrared waves

Spyware:

resides on a computer, collecting information about the computer's activities and reporting back to the spyware's instigator.

Virus:

software program that infects a computer by inserting itself into programs that already reside in the machine.

Proxy Server:

software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server

Bus Network:

the machines are connected to a common communication line called a bus

Tier 3 of ISPs:

typically independent internets, sometimes called intranets, operated by a single organization that supplies internet access to homes and businesses.

Cluster Computing:

uses many independent computers to provide computation or services comparable to those of a larger machine

Fiber-Optic Cable:

uses the concept of reflection of light through a core made up of glass or plastic. The core is surrounded by a less dense glass or plastic covering called the cladding.

What are the common network media used in wired networks?

Twisted pair cables, coaxial cable, and optical fiber cables

Coaxial Cable:

a shielded and insulated copper cable that is used in computer networks and to deliver cable TV services

Star Network

a single machine serving as a central point to which all others are connected

Grid Computing:

a type of distributed system that is more loosely coupled than clusters but still works together as a system to complete large tasks

Firewalls:

block outgoing messages with certain destination addresses or block incoming messages from untrustworthy sources.

What are the four common topologies?

bus, star, ring, and mesh

Examples of malware?

computer viruses, worms, spyware, and phishing

Broadband:

considered high-capacity transmission technologies that are used to transmit data, voice, and video across long distances and at high speeds

Tier 1 of ISPs:

consist of high-speed, high-capacity, international WANs that are typically operated by large communication companies - least common type - backbone of the internet

IP addresses are traditionally written in _____________ notation.

dotted decimal

Mesh Network:

enable redundancy while also introducing significantly more network traffic - connects every device in a network to every other device

Tier 2 of ISPs:

essentially networks of routers that collectively provide the internet's communication infrastructure - more common and regional in scope

Distributed Systems:

execute software as processes on more than one computer

Wide Area Network (WAN):

link systems over a greater distance, including machines on the opposite sides of the world

Network bandwidth is typically measured in _________________ and _____________.

megabits per second (Mbps) and gigabits (Gbps) per second

Which network topology best handles downed links without losing connectivity between devices?

Mesh

Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person?

Phishing

Local Area Network (LAN):

a collection of computers in a single building or building complex

Transmission Medium:

a component that carries data from one network device to another

Malware:

any software intentionally designed to cause damage to a computer, server, client, or computer network

Worm:

autonomous program that forwards copies of itself to other machines in a network and could result in detriment of individual machines or the operations of the network


Related study sets

Chapter 4 Quiz Estates and Interests in Real Property

View Set

HIST 170 New World Encounters: Preconquest-1608

View Set

MEEEN 360 Ch 10: Solid Solutions and Phase Equilibrium

View Set

Articles of Confederation and The Framing of the Constitution

View Set