COMP MIDTERMS Flashcards
The different ways hardware, software,
and systems may connect and interact
these are called
connectivity and networking
This is one of the most popular forms of
wired networking, connecting devices to
a local area network (LAN) or the
internet using cables (often CAT5e or
CAT6). It provides dependable, fast
connectivity.
Ethernet
These connections, which provide
incredibly high capacity and
long-distance communication, convey
data via light signals. They are
frequently used in data centers and for
high-speed internet backbones.
Fiber Optic
Cable television and high-speed internet
connections frequently employ coaxial
wires. Their bandwidth and signal
quality are both excellent.
Coaxial Cable
Types of Wired Networking
Ethernet, Fiber Optic, Coaxial Cable
Meaning of LAN
Local Area Network
With the help of this, devices may
connect wirelessly to the internet or a
local network without the need for
physical wires. In businesses,
residences, and public spaces, it is
extensively utilized.
Wi-Fi (Wireless Fidelity)
A short-range wireless technology
called ______ links items like
headphones, keyboards, and
cellphones.
Bluetooth
This permits wireless short-range
communication between devices,
frequently used for data transmission
and contactless payments.
NFC (Near Field Communication)
These wireless communication
protocols are intended for low-power,
low-data-rate uses, such as the Internet
of Things (IoT) and smart homes.
Zigbee and Z-Wave
____________ technologies including
3G, 4G LTE, and 5G give mobile
devices wireless internet connection.
Data speed and coverage areas vary
between them.
Cellular Network
Internet connection in remote or rural
locations where wired or cellular
networks would not be accessible is
made possible by this technology, which
makes use of satellites circling the
Earth.
Satellite Networking
Devices connect with one another
directly in ____ networks without the
need of a central server. This kind of
networking is frequently utilized for
decentralized apps and file sharing.
P2P
These establish private, secure
connections across a public network,
often the internet. In order to provide
remote access to private networks and
safeguard the privacy of data, they are
frequently utilized.
VPN (Virtual Private Networks)
This is a networking strategy that
divides the data plane, which sends
data packets, from the control plane,
which controls network traffic. More
flexibility and control over network
resources are provided by it.
Software-Defined Networking
Machines, sensors, and control systems
are connected via industrial networks in
manufacturing and automation
environments. Examples include
Profibus, Modbus, and Ethernet/IP.
Industrial Networking
_________ provide limited access to the
public whereas _________ are internal
networks that are only accessible by
members of the company. They serve
as a platform for corporation and
internal communication.
Extranet, Intranet
__________ have become
increasingly important as our reliance
on computers has grown.
Understanding topics such as
encryption, firewalls, and best practices
for safe computing is critical for
safeguarding personal and sensitive
data.
Security and Privacy
refers to the policies and
procedures used to guard against
unwanted access, assaults, and
damage to computer networks,
systems, and data.
Cybersecurity
Implementing _____ to
filter network traffic and prevent
malicious access.
Firewalls
Using ______
programs to detect and remove
malware.
Antivirus
Encrypting sensitive
data to make it unreadable to
unauthorized users.
Encryption
Implementing
strong user authentication and
authorization systems.
Access Controls
Having plans
in place to address and recover from
security breaches.
Incident Response
includes defending physical
assets, data centers, and equipment from
damage or theft in addition to protecting
against digital threats.
Physical Security
Protecting the
confidentiality, integrity, and availability of
information, including trade secrets, customer
data, and proprietary information.
Information Security
Ensuring the safety of
data during transmission across networks,
preventing eavesdropping or data interception.
Network Security
refers to
individuals’ control over their personal
information and how it is collected, used,
shared, and stored by organizations and
institutions.
Data Privacy
Key aspects of Data Privacy
Consent, Data Minimization, Transparency, Access and Correction, Data Protection
Concerns related to online
activities, including browsing habits, social
media usage, and online purchases. Online
privacy tools like virtual private networks
(VPNs) and browser privacy settings help
protect online privacy.
Online Privacy
The
balance between government surveillance for
security purposes and protecting citizens’
privacy rights is a complex issue that continues
to evolve
Surveillance and Government Privacy
Security and
privacy are fundamental rights that
enable individuals to protect their
personal information, communicate
freely, and conduct online
transactions with confidence
Individual Rights
____ is essential in the digital
world. People and organizations
need to trust that their information
will be secure and their privacy
respected when using online
services
Trust
Numerous laws and
regulations (e.g., GDPR, CCPA,
HIPAA) require organizations to
uphold security and privacy
standards, with non-compliance
resulting in legal consequences.
Legal and Regulatory
Compliance
Businesses that prioritize security
and privacy gain a competitive edge
by building trust with customers and
avoiding costly data breaches.
Business Competitiveness
Governments
have a duty to protect national
security interests while respecting
citizens’ privacy rights, often leading
to debates and legal battles
National Security
Ethical
questions arise regarding the
responsible use of technology and
data, requiring ongoing dialogue and
ethical frameworks.
Ethical Considerations
is the
first step in ensuring computer security
and privacy
comprehension of
hardware and software elements
refers
to a computer’s actual hardware, which
comprises the central processor unit
(CPU), memory, storage devices, and
input/output devices.
Hardware
Operating
systems, programs, and applications
are all included in
Software
control computer resources and give
software a platform to execute on.
Operating Systems
are used in almost every
industry, including commerce,
healthcare, education, entertainment,
and research. They are extremely
important in data analysis, modeling,
design, and automation.
Computers
Emerging technologies such as artificial
intelligence, quantum computing, and
the Internet of Things (IoT) are
influencing the future of computing,
offering ever more amazing capabilities
and uses.
Future Trends