Finals Flashcards
Define topology in networking terms.
the layout/arrangement of nodes and communications media within a network
Name four common networking topologies.
bus, star, mesh, and ring
In bus topology, _____ are placed at the ends of the cables. Why?
terminators; they prevent data from mirroring back through the wires
Describe a bus topology.
a cable is run in a line with devices connected along the way
A _____ topology is the most basic. It is outdated so many people _____ use it now. This is because…
bus; don’t; mirroring can cause confusion and if a line breaks, a device is completely cut off.
If a connection breaks in ring topology, what will the data do?
switch directions
The _____ is the most common topology.
star
Describe a mesh topology.
is made of multiple lines connecting through each device/node
Why is a mesh topology so reliable?
it has so many lines of back-up if a line breaks
The internet is a _____ topology. The wires under the sea, however, USE to be a _____ topology.
mesh; ring
Anything connected either directly or indirectly to the _____ has an IP address.
internet
What’s the order of wire colors for an internet cable?
orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
Why do you twist wires in cables?
to reduce the “noise” between them so more dat packets don’t have to be requested
A _____ is the first device that the internet hits when it’s being brought into a household or area when not wireless.
modem
What’s an RJ-45?
the connector piece at the end of an internet cord
What is a hub and what does it do?
it’s a basic device that splits your signal; one signal comes in, multiple go out; they don’t regulate traffic
What is a switch and what does it do?
it’s a device that are like hubs but with more regulations; the data uses a ‘four-way stop’ to regulate
Are some hubs or some switches programmable?
switches
_____ are like midway stations for the internet.
routers
When _____ _____ go through routers, they are tracked.
data packets
Why are hubs, switches, and routers related to each other?
they all direct or regulate traffic and have cords connecting to them
What is a computer network?
a bunch of computers connected to each other
What does a network allow for between different devices?
communication or transmission of data
Give three examples of data.
documents, pictures, videos, etc
Name three things needed to make a network work.
radio waves, copper wires, fiber optics, traffic regualtor, etc
What is the biggest network? How big is it?
the internet; worldwide
How are networks classified?
by size or reach
What does LAN stand for? How big is it? Give an example of where it may be found.
Local Area Network; smallest size; found in homes or highschools or same building
What does MAN stand for? How big is it? Give an example of where it may be found.
Metropolitan Area Network; middle sized; used to span large cities or entire counties
What does WAN stand for? How big is it? Give an example of where it may be found.
Wide Area Network; largest sized and must be more than 30 mile stretch; used to connect cities together through satellite
The largest single entity WAN is…
social security network
What is a fiber optic cable?
a cable that transmitts data by light pulses
What are modems in basic terms? How so?
language translators; they take data and make it into internal computer language
What are the two basic parts of networking?
communications media and nodes
The physical part of the network are _____ while everything else that connects _____ to a network are _____ _____.
nodes; nodes; communications media
What does NIC stand for and what is it?
Network Interface Card; it provides a physical place that allows you to connect to a network
What does TCP stand for and what does it do?
Transmission Control Protocol; it decides how the pieces of data are sent to the computer and splits up data into packets and reassembles
What does IP stand for and what does it do?
Internet Protocol; it addresses each data packet to its destination in order to get to the correct computer
Explain how to use a subnet mask to read an IP address. Which number is for your network and which one is for the specific computer device?
255 and 0 are used in a four number combination like (255. 255.255.0)
the 255 describes which network to go to while the 0 explains the specific device
every IP adress is divided into four sections like the subnet mask
the numbers are used to line up in order for servers to identify the correct location of the device
What happens when you search something on the internet?
a request is made to a server warehouse where a server breaks up the information into packets and then sends it to your computer
What happens when the IP finds out that a packet doesn’t make it through?
it requests a new one and sends it off again
Once packets are approved they travel to the _____. It protects and prevents computers from what things?
firewall; protects from infections and prevents corporate information to leak into the internet
Define an output device then give an example of one. Define an input device.
a device that sends out data; printer; a device that recieves or sends data to a computer
What is a crimper?
a crimper is used to push an RJ-45 over wires to keep them unexposed to conditions
What is the keyboard shortcut for search, copy, paste, and cut?
search: ctrl + f
copy: ctrl + c
paste: ctrl + v
cut: ctrl + x
What does the shortcut “alt + tab,” “ctrl + a,” and “ctrl + z” do?
alt + tab: switches you to a different window
ctrl + a: selects all
ctrl + z: undo
What is the shortcut for redo and highlighting the web address?
redo: ctrl + y
web address: alt + d
If my mouse pad/ mouse looses its battery, how should I add a bookmark to a favorite page of mine for easier selection later on?
use the shortcut on your keyboard ctrl + d
What is the keyboard shortcut for forward delete, open a new tab, open a new window, open up an old tab, and close a tab?
forward delete: alt + backspace new tab: ctrl + t new window: ctrl + n old tab: ctrl + shift + t close tab: ctrl + w
What does the button “enter” do? What about “tab?”
enter exucutes
tab moves down on a browser
How do ctrl and shift differ when selecting items?
ctrl: select specific items on a list
shift: allows you to collect an entire range of items
On a mouse, what does the left clicker do vs the right clicker?
left: selects and executes
right: provides options on where you clicked
Define what a database is and give two examples.
database: a collection of similar data of the same information
examples: phone book, mp3 player
What are the areas in a database called?
fields
What is the moral arguement against piracy?
whether piracy is good or bad
What is the majority rule for piracy?
if there is a law that most people don’t agree on, it should be taken away
What’s the Robin Hood argument for piracy?
piracy takes from the rich and gives to the poor; waht you don’t spend in one place can be spent in others; you are actually doing a noble thing by stealing from the rich
When is making a digital copy not against the law?
when you have boughten a piece and copy it for your own use
What is a rebuttal?
the final argument in a debate where opposing arguments are combined and addressed
What does the fair use law about copyright ensure?
the security of artists’ work being known as their own
In the fair use law, who isn’t allowed to use copywritten materials without permission? Give an example.
people who use them for profit like a business
In the fair use law, who is allowed to use what percentage of copywritten materials without permission? Name the three areas.
education, newsmedia, and nonprofit organizations can use around 10% of product without asking permission
How long does a copyright term last and how much does it cost to buy?
it lasts author’s lifetime + 70 years and is free because it happens when a product is made
Which creative protection is the most expensive to secure the rights to? Why?
patent because you usually use the product for a profit
Which protection is more about identity than it is about making money?
trademark
What is the Denny’s Sampler?
when you link a bunch of quotes together and take different things people have said then using them word for word as your own
What is the Ghost Writer?
when someone writes a paper for you and then you put it in your name; it can be bought
What is the Photocopy?
when you copy and paste stuff and don’t cite it properly
The _____ is the most common type of plagiarism because…
Photocopy; computers make it really easy to copy and paste stuff
What are two reasons people plagiarise for?
they have poor time management and don’t know what they are doing
Why is FPV Quad Racing the next revolution in video gaming?
it mixes virtual and real reality together
Name the five steps to making a research paper.
1) Pick a topic and write an outline
2) Find quotes
3) Find sources for bibliography
4) Type sources with proper citations
5) Fill in the gaps
What does an outline help you to eliminate and do?
eliminates unneeded details and organizes your thoughts
Research papers report on…
what other people have said
What does MLA stand for?
Modern Language Association
What does MLA usually report on?
humanities or English related topics that aren’t sciencey
MLA doesn’t use a title page. Instead it uses a _____.
header
MLA doesn’t use a bibliography. Instead it uses a _____ _____ page.
works cited
What’s the nommanclature for an in-text citation?
“(last name, page number).
What does the fourth amendment state?
it protects the privacy of a citizen and states that the even the government can’t come and invade your privacy without a good reason and a warrant
Name 8 things to have good internet conduct.
- Use good grammar.
- Only post G-rated pictures.
- Use emoticons when appropriate.
- Don’t post personal information.
- Don’t post locations or GPS tag your activities.
- Don’t be provocative.
- Use language that is appropriate for future viewers
- Don’t gossip about others.
What was ThinThread? How did it differ from “The Program?”
ThinThread was made to protect citizens by gathering suspicious metadata from outward sources; it still allowed Americans to keep their identities hidden through encryptians; “the program” didn’t have encryptians and spied on American citizens
What does NSA stand for and what is their job?
National Security Agency; to make sure the United States doesn’t get attacked
Who were: Edward Snowden, Glenn Greenwald, General Hayden, Dick Cheney, Tamm, and Drake?
Snowden: the man who announced the program to the public in 2013
Greenwald: journalist who was first contacted by Snowden and then, through a series of events, got thousands of NSA documents and wrote articles about them
Hayden: NSA’s director and proposed the program to the president (Bush)
Cheney: Vice President and pushed Hayden to make the program legal
Tamm: department of justice lawyer, whistleblower who secetly told info about the program to newspapers
Drake: told individuals secretly about the program
What is the Bechdel Test?
1) there must be two+ women 2) talking 3) about something other then men or sex
What percentage of men view porn regularly? Women?
men: 64 %
women: 20%
What percentage of internet revenue does porn make up? How much money is that?
~30%
$28,000,000,000; 28 billion dollars
What’s the percentage of internet cites dedicated to porn?
12%
What’s the percentage of men who masturbate regularly? Women?
men: 96%
women: 74 %
How do we see that the internet hates women?
porn shows aggressiveness and other bad qualities that pervert how God created sex, for women and men; women are only looked on as sex symbols in movies, like in the bechdel test
What is considered marketing? Give a definition. How does this affect pictures?
marketing promotes products, oneself, or an idea; marketing is used nowadays a lot more because it allows you to make money, this meaning that people will spruce up their images for profit
What percentage of pictures are digitally altered? How do we know?
100%; cameras have dynamic range that don’t percieve as much as us so they alter the picture within the camera until it looks closest to reality; photography is basically art
Name four reasons photography is studied in computer class. Include Moore’s Law.
a) cameras are basically tiny specialized computers
b) Moore’s law states computers will double in proccessing so cameras will too
c) it’s fun! and our computer teacher enjoys it
d) every picture seen is processed on a computer screen at least once
How does a camera create a picture?
photons go through camera lens - they come to Red, Green, and Blue filters - filters stop other wavelength from passing through that doesn’t match its color - the light goes through filters and hits silicon “wells” - “wells/pixels” become active - info is combined into an image
What’s a silicon waffer?
a man-made spun silicon pillar that is used to be made into CPUs, sensors, and other computer related items
What are burnt highlights? What is over and under exposure? How are they related?
burnt highlights; when an image is over exposed so much that the data is lost in a blur; over exposed is when an image is brighter then what you see in reality while under is when it’s darker than reality
What’s dynamic range?
the shades/colors that can be seen between pure white and pure black
What does shuter speed do? Which speed does what?
shutter speed blurs or freezes motion; fast shutter speed freezes it and slow blurs it
In the formula A + S = E, what do the letters stand for?
Aperture
Shutter Speed
Exposure
What is aperture and what does it do?
aperture is how wide the lens opens and it affects how much light is let in along with the depth of field
Fill in the blanks according to aperture. A big f-stop number = _____ hole in lens = _____ depth of field
small, big
so big number=small hole=big depth of field
What does a shallow depth of field mostly used for and what does it look like? Explain large, too.
shallow depth of field is used for portraits and makes the background and front blurred more; large depth of field is used for landscapes and keeps everything in focus