Chapter 5 Flashcards

1
Q

Local Area Networks

A

LANs, data communications system of relatively close devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wide Area Networks

A

connection of two or more central LAN computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intranet

A

an internal version of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Extranet

A

to share an intranet with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attenuation

A

loss of intensity and clarity of the data signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bandwidth

A

amount of data that can be transmitted at a given time, measured in gigibits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Media

A

what links parts of a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Node

A

connection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Twisted Pair Cable

A

four pairs of wires twisted around each other that are collectively bound in plastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coaxial Cable

A

consists of a single copper wire that is surrounded by insulation and a wire mesh shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fiber Optic Cable

A

a thin strand of glass that transmits pulsing beams of light rather than electric currents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Fiber Optic immune to?

A

Electromagnetic interferance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless Networks

A

use radio signals to transmit data, operate on either 2.4 GHz or 5GHz bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Access Point

A

is necessary to connect devices for a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless Adapter

A

desktops require one to join the wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11

A

Wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11g

A

gets 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11n

A

gets 600Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.11ac

A

gets 1Gps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11ax

A

supports more simultaneous data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Packets

A

data moves through networks in this structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Header of a Packet

A

includes information needed by the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Payload of a Packet

A

contains the data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Topology

A

logical layout of the cables and devices that connect nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network Interface Card

A

NIC, the devices at each node that performs translation and transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

MAC Address

A

a NICs identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Repeater

A

prevents attenuation when packets travel long distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hub

A

provides multiple ports for connecting nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Switch

A

a hub that is aware of the identity of each attatched node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Router

A

stores routing info in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Gateway

A

a node that serves as an entrance to another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Bridge

A

a device that connects to LANs or two segments in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ethernet

A

physical transmission standard for LANs

34
Q

Information System

A

a complex system for acquiring, storing, organizing and sharing data

35
Q

Office Automation System

A

manages info and assists in related tasks for an organization

36
Q

Transaction Processing System

A

handles processing and tracking of transactions

37
Q

Management Information Systems

A

software tools that allow managers to gather and evaluate information

38
Q

Decision Support System

A

collects and reports data to help one make better decisions

39
Q

Expert Systems

A

performs analytic tasks

40
Q

Mission Critical System

A

run without failure

41
Q

Fault Tolerant (Mission Critical System)

A

allows a system to continue to operate when problems are present

42
Q

Redundant (Mission Critical System)

A

systems that perform the same tasks at the same time

43
Q

RAID

A

a storage system that links any number of disk drives

44
Q

Striping (RAID 0)

A

rapid access by spreading data across several disks

45
Q

Mirrored System (RAID 1)

A

puts data on two or more disks simultaneously

46
Q

Striping with Parity (RAID 5)

A

data is spread across disks, but stores error correcting code in case a disk fails and can be reconstructed

47
Q

Scalability

A

provides increasing amounts of power, storage, and software

48
Q

Interoperability

A

ability of an organization to work together

49
Q

Big Data

A

large amounts of data generated by a device

50
Q

Data Warehouse

A

info is archived here

51
Q

Data Analytics

A

when experts use modeling software and stats to extract knowledge from large volumes of data

52
Q

Business Inteligence

A

encompasses all data, tools, strategies used by a business to improve decisions and predictions

53
Q

Data Mining

A

discovers new patterns or relationships between data

54
Q

Data Validation

A

checking and improving reliability of data

55
Q

Threat

A

anything that causes harm viruses, earthquake

56
Q

Vulnerability

A

a weakness that has not been protected

57
Q

Risk Assessment

A

when you identify possible threats, a safeguard is wise

58
Q

Counter Measure

A

any step you take to ward off a threat

59
Q

Surge Protector

A

guards connected equipment against large power surges

60
Q

Uninterruptible Power Supply

A

UPS, another way to protect against power fluctuations and failure, contains a surge protector and a rechargeable battery

61
Q

Scareware

A

a scam that scares and individual into following the requests of the thief

62
Q

Ransomware

A

threatens to delete or publicly expose a victim’s stolen data unless money is paid

63
Q

Virus

A

a type of malware that is attached to a host file and can replicate itself

64
Q

Worm

A

self-replicating malware that spreads through computers and networks

65
Q

Trojan Horse

A

a program disguised as interesting/important in order to gain access to your system

66
Q

Spyware

A

reports your activity to another party

67
Q

Hacker

A

individuals who use computer systems to commit crimes

68
Q

Cyber Crimes

A

creating viruses, disrupting networks, those who hack to commit crimes are known as “black hats”

69
Q

Hacktivism

A

hacking with a social or political agenda

70
Q

Cyber Warefare

A

conducted by countries, terrorists, or large groups, the aim is to hack and steal sensitive info or cause major disruptions

71
Q

Zombies

A

infected or compromised computers

72
Q

Botnets

A

massive networks of zombies that can be used to hack or spread viruses

73
Q

Distributed Denial of Service

A

DDoS, allows hackers to shut down or block access to websites or other network resources by overwhelming them with requests

74
Q

Rogue Hotspot

A

a free hot spot set up by hackers to gain access to your transmissions

75
Q

Identity Theft

A

hackers who assume ones identity

76
Q

Social Engineering

A

hacking that deceives people into getting what they want

77
Q

Phishing

A

lures people to put in their info into a hacked site

78
Q

Pretexting

A

gaining someone’s trust by pretending to be someone else

79
Q

Virtual Private Network

A

increases security of a network connection by using tunneling

80
Q

Tunneling

A

when a packet is put in another before being sent