Applied computing Flashcards
for sac purposes and exam
ethernet
a widely used networking technology that connects devices in a local area network for high speed data exchange.
WAN(Wide Area Network)
Connects computer and LANs over large geographical distances (such as cities, countries, and even globally)
LAN(local area network)
a network that connects computers and devices within a limited geographical area (such as home, schools, office)
difference of WAN to LAN(geographically)
WAN covers larger areas such as cities, and LAN covers a small area like a building or office
difference of WAN to LAN (in terms of speed)
LAN is generally faster due to limited distance and less connected devices, this is different to WAN as they are slower due to large distances and network congestion
The cost difference between LAN and WAN
LAN requires much cheaper costs and maintenance. and WAN on the other hand requires higher costs due to the distances and network congestion.
In terms of connection type, what are the differences between WAN and LAN
LAN uses ethernet cables, wifi, while that of WANs uses leased lines and satelite links
how about security, what are the difference between WAN and LAN
LANs are easier to secure with internal controls, and WAN is more complex to secure and vulnerable to external threats.
WAP (wireless access point)
this is a networking device that allows wireless-capable devices to connect to a LAN using Wi-fi or related wireless standards. As we can refer to that the WAP serves as a bridge in between the wired network to wireless devices.
Wi-Fi
a wireless network technology that uses radio waves to provide high speed internet
Switch
a switch connects network devices (printers, computers, and wireless devices/access points and enables users to exchange data packets)
Back-up
the process of creating a copy of data and storing it separately to protect against data loss, corruption or disaster
Full Back-up
A complete copy of all data in a system or selected location
Incremental backup
only back up data that has changed since the last backup, whether is was a full or another incremental
Mirror back up
Creates an exact copy of selected data at a point in time, continuously updated to reflect any changes
Cloud backup
back up data to remote servers managed by cloud providers
Virus (computer virus)
Attaches itself to legitimate files or programs and spreads to other files, causing damage and disrupting system functions.
Worm
self-replacates and spreads across networks without user intervention, often causing network slowdowns or failures
Trojan House
It cannot be duplicated, where it disguises itself as legit software to trick users into installing it, the performs malicious actions stealing data
spyware
Monitors user activities and collects personal information without consent, often used for tracking browser behavior or gathering sensitive data
Adware
Displays unwanted advertisements and may track browsing habits
Ransomware
encrypts or locks user data, demanding a random payment to restore access, frequently targeting businesses and individuals.
Rootkit
Hides within an operating system to gain unauthorized access, enabling attackers to control the system while evading* detection
Backdoor
creates an unauthorized entry point to a system, allowing attackers to bypass normal authentication and gain remote access
Phishing malware
delivers malicious links or attachments through deceptive emails or messages, aiming to steal personal or financial information.
internet
Global public network connecting Millions of users
Intranet
private network for internal use within an organization
internet access and security
As it is open to everyone, it is less secure
intranet access and security
authorized users only and therefore more secure as access is controlled
key purpose of VPN
there is a remote access which enables employees to securely access the company network from any location
key purpose of VPN (2)
encrypts sensitive data and protect it from interception or unauthorized access especially on public or insecure networks
key purpose of VPN (3)
reduces the need for expensive leased line by allowing secure access over public internet infrastructure