Commtech 4 Flashcards
Codec
Compression/decompression
Mpeg
Moving picture expert group
Name of a family of standards for coding video and audio information in a digital compressed format
I-picture
Intra-coded picture
Single compressed picture that contains all the spatial information of a video picture
Encoded as free standing image (no B-pic or P-pic reference)
P-picture
Predictive
Computed based on nearest previous I- or P-pic
More compressed than I- pictures and provide a reference for the calculations
B-pictures
Bi-directional pictures
Use both past and subsequent pictures as references to calculate the compressed picture data
DTCP
Digital transmission content protection
ACP
Analog copying & piracy
Prevents or distorts copies made over an analog connection
CA
Conditional access
The protection of content by requiring certain criteria to be met before granting access to this content
HTIB
Home theater in a box
Direct view tv
CRT
Least expensive
Highest quality picture
Size limitations
Rear projection tv
CRT,DLP, LCD,LCos
Larger screen size
Lower profile
Affordable
Front projection tv
CRT, DLP, LCFD, LCos
Largest size
Needs highly reflective screen
Flat panel
LCD, Plasma
Larger size screen
Lowest profile
Four actions performed by a virus
R,Ew,C,D
Replication, event watching, camouflage, delivery
Main types of viruses
E,Em,W,Th
Executable, email, worms, Trojan horses
Replication
Inserts copies of itself into other program files
Replicates itself
Event watching
Checks for conditions (usually a specific date)
When conditions exist, virus delivers its destructive payload.
Camouflage
Disguise themselves to avoid antivirus detection
May falsify information in header so program file appears to be the correct size
Delivery
When triggering condition is met
, virus unleashes payload
May be harmless or destructive
Executable virus
Software that piggybacks on rep programs
When program runs, the virus runs too
E-mail virus
Contained in an email or its attachments or both
Usually replicates itself by mailing itself to dozens of people in victims email address book
Worms
Software: uses computer networks and security holes to replicate itself
A copy of the worm scans the network for another machine that has a specific security hole.
Trojan horses
Small program
Claims to be something it’s not (like a game) but when it runs it does damage (sending e,ails, erasing files)
Spyware
A program that sends information about you and how you use your PC to makers and advertisers, usually without you being aware
Spammers target
Email Instant messaging Newsgroup Search engines Blogs Mobile phones
3 main types of firewall rules
Packet filtering
Proxy
Stateful inspection
MPOE
Minimum point of entry
Commercial demarcation point for business class digital voice
Telemetry cable
*Color sequence
WBBOG
White brown blue orange green
Network
A system of computers, peripherals, terminals, and databases connected by communications lines
LAN
Local area network
Close set of computers on a single network
WAN
Wide area network
Example Internet
Firewall
A firewall permits and blocks traffic
Hardware or software
VPN
Virtual private network
Uses a public network to establish a secure connection with an organization private network
NAT
Network address translation
Technique by which several computers share a single IP address for access to the Internet
PAT
Port address translation
Forwards requests for a particular ip port pair to another ip port pair
Subnetworks
Subnetting is the concept of partitioning large networks into smaller segments
255.255.255.0
Consider IP address 150.215.017.009
The first set (150.215) represents?
The second set (017.009) represents?
First set network
Second set define host (device)
IP address contained within a subnetwork
N,R,G,B
Network, routable, gateway, broadcast
Subnet mask
Combined with the IP address the sub IP subnet mask allows a device to know which other addresses are local to it and which must be reached through a gateway or router. a number that explains which part of an IP address comprises the network address and which part is the host address on that network.
255.255.255.0
Signal leakage limits at 30 m
15 µV per meter
Signal leakage limits at 3 m
20 µV per meter
Ghosts
Caused when a TV signal of the same frequency and video content arrives at the receiver just before or just after the desired TV signal
Thermal noise
Caused by random electron activity of the atoms that make up the conductor, resistor or any part of the passive circuit in question
Happens at any temperature above absolute zero
Carrier to noise
(C/N) ratio
The difference NP carrier level, to the noise level
Levels both are measured in dBmv
-59.2dBmv
Cross modulation
XMOD
Crossing of modulation from one channel to another
CTB
Composite triple beat
The tv carriers on a cable system are spaced in 6 MHz increments
Channels 5&6 are more than 6 MHz apart.
Interference threshold of beats
57 dB below the carrier