COMP MIDTERMS Flashcards

1
Q

The different ways hardware, software,
and systems may connect and interact
these are called

A

connectivity and networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is one of the most popular forms of
wired networking, connecting devices to
a local area network (LAN) or the
internet using cables (often CAT5e or
CAT6). It provides dependable, fast
connectivity.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These connections, which provide
incredibly high capacity and
long-distance communication, convey
data via light signals. They are
frequently used in data centers and for
high-speed internet backbones.

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cable television and high-speed internet
connections frequently employ coaxial
wires. Their bandwidth and signal
quality are both excellent.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Wired Networking

A

Ethernet, Fiber Optic, Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Meaning of LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

With the help of this, devices may
connect wirelessly to the internet or a
local network without the need for
physical wires. In businesses,
residences, and public spaces, it is
extensively utilized.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A short-range wireless technology
called ______ links items like
headphones, keyboards, and
cellphones.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This permits wireless short-range
communication between devices,
frequently used for data transmission
and contactless payments.

A

NFC (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These wireless communication
protocols are intended for low-power,
low-data-rate uses, such as the Internet
of Things (IoT) and smart homes.

A

Zigbee and Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____________ technologies including
3G, 4G LTE, and 5G give mobile
devices wireless internet connection.
Data speed and coverage areas vary
between them.

A

Cellular Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet connection in remote or rural
locations where wired or cellular
networks would not be accessible is
made possible by this technology, which
makes use of satellites circling the
Earth.

A

Satellite Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Devices connect with one another
directly in ____ networks without the
need of a central server. This kind of
networking is frequently utilized for
decentralized apps and file sharing.

A

P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These establish private, secure
connections across a public network,
often the internet. In order to provide
remote access to private networks and
safeguard the privacy of data, they are
frequently utilized.

A

VPN (Virtual Private Networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a networking strategy that
divides the data plane, which sends
data packets, from the control plane,
which controls network traffic. More
flexibility and control over network
resources are provided by it.

A

Software-Defined Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machines, sensors, and control systems
are connected via industrial networks in
manufacturing and automation
environments. Examples include
Profibus, Modbus, and Ethernet/IP.

A

Industrial Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________ provide limited access to the
public whereas _________ are internal
networks that are only accessible by
members of the company. They serve
as a platform for corporation and
internal communication.

A

Extranet, Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__________ have become
increasingly important as our reliance
on computers has grown.
Understanding topics such as
encryption, firewalls, and best practices
for safe computing is critical for
safeguarding personal and sensitive
data.

A

Security and Privacy

19
Q

refers to the policies and
procedures used to guard against
unwanted access, assaults, and
damage to computer networks,
systems, and data.

A

Cybersecurity

20
Q

Implementing _____ to
filter network traffic and prevent
malicious access.

A

Firewalls

21
Q

Using ______
programs to detect and remove
malware.

A

Antivirus

22
Q

Encrypting sensitive
data to make it unreadable to
unauthorized users.

A

Encryption

23
Q

Implementing
strong user authentication and
authorization systems.

A

Access Controls

24
Q

Having plans
in place to address and recover from
security breaches.

A

Incident Response

25
Q

includes defending physical
assets, data centers, and equipment from
damage or theft in addition to protecting
against digital threats.

A

Physical Security

26
Q

Protecting the
confidentiality, integrity, and availability of
information, including trade secrets, customer
data, and proprietary information.

A

Information Security

27
Q

Ensuring the safety of
data during transmission across networks,
preventing eavesdropping or data interception.

A

Network Security

28
Q

refers to
individuals’ control over their personal
information and how it is collected, used,
shared, and stored by organizations and
institutions.

A

Data Privacy

29
Q

Key aspects of Data Privacy

A

Consent, Data Minimization, Transparency, Access and Correction, Data Protection

30
Q

Concerns related to online
activities, including browsing habits, social
media usage, and online purchases. Online
privacy tools like virtual private networks
(VPNs) and browser privacy settings help
protect online privacy.

A

Online Privacy

31
Q

The
balance between government surveillance for
security purposes and protecting citizens’
privacy rights is a complex issue that continues
to evolve

A

Surveillance and Government Privacy

32
Q

Security and
privacy are fundamental rights that
enable individuals to protect their
personal information, communicate
freely, and conduct online
transactions with confidence

A

Individual Rights

33
Q

____ is essential in the digital
world. People and organizations
need to trust that their information
will be secure and their privacy
respected when using online
services

A

Trust

34
Q

Numerous laws and
regulations (e.g., GDPR, CCPA,
HIPAA) require organizations to
uphold security and privacy
standards, with non-compliance
resulting in legal consequences.

A

Legal and Regulatory
Compliance

35
Q

Businesses that prioritize security
and privacy gain a competitive edge
by building trust with customers and
avoiding costly data breaches.

A

Business Competitiveness

36
Q

Governments
have a duty to protect national
security interests while respecting
citizens’ privacy rights, often leading
to debates and legal battles

A

National Security

37
Q

Ethical
questions arise regarding the
responsible use of technology and
data, requiring ongoing dialogue and
ethical frameworks.

A

Ethical Considerations

38
Q

is the
first step in ensuring computer security
and privacy

A

comprehension of
hardware and software elements

39
Q

refers
to a computer’s actual hardware, which
comprises the central processor unit
(CPU), memory, storage devices, and
input/output devices.

A

Hardware

40
Q

Operating
systems, programs, and applications
are all included in

A

Software

41
Q

control computer resources and give
software a platform to execute on.

A

Operating Systems

42
Q

are used in almost every
industry, including commerce,
healthcare, education, entertainment,
and research. They are extremely
important in data analysis, modeling,
design, and automation.

A

Computers

43
Q

Emerging technologies such as artificial
intelligence, quantum computing, and
the Internet of Things (IoT) are
influencing the future of computing,
offering ever more amazing capabilities
and uses.

A

Future Trends