Chapter 5 Flashcards

(80 cards)

1
Q

Local Area Networks

A

LANs, data communications system of relatively close devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wide Area Networks

A

connection of two or more central LAN computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intranet

A

an internal version of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Extranet

A

to share an intranet with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attenuation

A

loss of intensity and clarity of the data signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bandwidth

A

amount of data that can be transmitted at a given time, measured in gigibits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Media

A

what links parts of a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Node

A

connection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Twisted Pair Cable

A

four pairs of wires twisted around each other that are collectively bound in plastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coaxial Cable

A

consists of a single copper wire that is surrounded by insulation and a wire mesh shield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fiber Optic Cable

A

a thin strand of glass that transmits pulsing beams of light rather than electric currents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Fiber Optic immune to?

A

Electromagnetic interferance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless Networks

A

use radio signals to transmit data, operate on either 2.4 GHz or 5GHz bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Access Point

A

is necessary to connect devices for a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless Adapter

A

desktops require one to join the wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11

A

Wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11g

A

gets 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

802.11n

A

gets 600Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.11ac

A

gets 1Gps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11ax

A

supports more simultaneous data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Packets

A

data moves through networks in this structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Header of a Packet

A

includes information needed by the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Payload of a Packet

A

contains the data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Topology

A

logical layout of the cables and devices that connect nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Network Interface Card
NIC, the devices at each node that performs translation and transmission
26
MAC Address
a NICs identifier
27
Repeater
prevents attenuation when packets travel long distance
28
Hub
provides multiple ports for connecting nodes
29
Switch
a hub that is aware of the identity of each attatched node
30
Router
stores routing info in a network
31
Gateway
a node that serves as an entrance to another network
32
Bridge
a device that connects to LANs or two segments in a LAN
33
Ethernet
physical transmission standard for LANs
34
Information System
a complex system for acquiring, storing, organizing and sharing data
35
Office Automation System
manages info and assists in related tasks for an organization
36
Transaction Processing System
handles processing and tracking of transactions
37
Management Information Systems
software tools that allow managers to gather and evaluate information
38
Decision Support System
collects and reports data to help one make better decisions
39
Expert Systems
performs analytic tasks
40
Mission Critical System
run without failure
41
Fault Tolerant (Mission Critical System)
allows a system to continue to operate when problems are present
42
Redundant (Mission Critical System)
systems that perform the same tasks at the same time
43
RAID
a storage system that links any number of disk drives
44
Striping (RAID 0)
rapid access by spreading data across several disks
45
Mirrored System (RAID 1)
puts data on two or more disks simultaneously
46
Striping with Parity (RAID 5)
data is spread across disks, but stores error correcting code in case a disk fails and can be reconstructed
47
Scalability
provides increasing amounts of power, storage, and software
48
Interoperability
ability of an organization to work together
49
Big Data
large amounts of data generated by a device
50
Data Warehouse
info is archived here
51
Data Analytics
when experts use modeling software and stats to extract knowledge from large volumes of data
52
Business Inteligence
encompasses all data, tools, strategies used by a business to improve decisions and predictions
53
Data Mining
discovers new patterns or relationships between data
54
Data Validation
checking and improving reliability of data
55
Threat
anything that causes harm viruses, earthquake
56
Vulnerability
a weakness that has not been protected
57
Risk Assessment
when you identify possible threats, a safeguard is wise
58
Counter Measure
any step you take to ward off a threat
59
Surge Protector
guards connected equipment against large power surges
60
Uninterruptible Power Supply
UPS, another way to protect against power fluctuations and failure, contains a surge protector and a rechargeable battery
61
Scareware
a scam that scares and individual into following the requests of the thief
62
Ransomware
threatens to delete or publicly expose a victim's stolen data unless money is paid
63
Virus
a type of malware that is attached to a host file and can replicate itself
64
Worm
self-replicating malware that spreads through computers and networks
65
Trojan Horse
a program disguised as interesting/important in order to gain access to your system
66
Spyware
reports your activity to another party
67
Hacker
individuals who use computer systems to commit crimes
68
Cyber Crimes
creating viruses, disrupting networks, those who hack to commit crimes are known as "black hats"
69
Hacktivism
hacking with a social or political agenda
70
Cyber Warefare
conducted by countries, terrorists, or large groups, the aim is to hack and steal sensitive info or cause major disruptions
71
Zombies
infected or compromised computers
72
Botnets
massive networks of zombies that can be used to hack or spread viruses
73
Distributed Denial of Service
DDoS, allows hackers to shut down or block access to websites or other network resources by overwhelming them with requests
74
Rogue Hotspot
a free hot spot set up by hackers to gain access to your transmissions
75
Identity Theft
hackers who assume ones identity
76
Social Engineering
hacking that deceives people into getting what they want
77
Phishing
lures people to put in their info into a hacked site
78
Pretexting
gaining someone's trust by pretending to be someone else
79
Virtual Private Network
increases security of a network connection by using tunneling
80
Tunneling
when a packet is put in another before being sent