Finals CS Flashcards
What allows users to access one another’s hard drives or cloud storage and exchange files directly?
Peer-to-peer (P2P) network, sometimes called a file sharing network.
What allows users connected to a network to exchange money from one account to another?
Electronic funds transfer (EFT).
What provides home users with capabilities such as sharing an Internet connection and files?
Home Networks.
What can be small or large and exist in one or multiple buildings, facilitating communication among employees?
Business networks.
What sends signals and data through cables?
Wired network.
What sends signals through airwaves and usually does not require cables?
Wireless network.
What is a network standard that defines how high-speed cellular transmissions use broadcast radio?
LTE (Long Term Evolution).
What requires a combination of hardware and software to operate?
Network.
What connects the sending device to transmission media?
Communications device.
What accepts the transmission of data, instructions, or information?
Receiving device.
What are the two basic categories of networks?
Home and business.
What typically exists within a single building and is accessed by only a few users?
Home networks.
What is meant to accommodate many users and large amounts of data across many buildings?
Business networks.
What initiates an instruction to transmit data, instructions, or information?
Sending device.
What means by which data, instructions, or information travel?
Transmission media, or communications channel.
What is the name of receiving data?
Downstream rate.
What is the name of sending data?
Upstream rate.
What is a navigation system that determines a receiver’s geographic location?
GPS (global positioning system).
What helps users establish a connection to another computer or network?
Communications software.
What is the method by which computers and devices are physically arranged on a network?
Topology.
What is the logical design of all devices on a network?
Network architecture.
What consists of one or more computers acting as a server while others request resources?
Client/server network.
What is a computer or mobile device on the network that relies on the server for resources?
Client.
What is a network architecture that typically connects a small number of computers?
A peer-to-peer (P2P) network.
What connects all devices to a central cable called a bus?
Bus network.
What interconnects all devices on the network, allowing alternate routes if one fails?
Mesh network.
What is a topology where each device is connected to every other device?
Full mesh topology.
What is a topology where each device may or may not be connected to all other devices?
Partial mesh topology.
In what network does data travel from one device to the next in a sequential fashion?
Ring network.
In what network is each device attached to a central device?
Star network.
What is a type of P2P network where users share files over the Internet?
Internet peer-to-peer (Internet P2P) network.
What describes networks configured in all sizes and defined by their geographic footprint?
Geographic Reach.
What connects personal digital devices within a range of approximately 30 feet?
Personal area network (PAN).
What is a form of personal area network consisting of small biosensors implanted in the body?
Body area network (BAN).
What specifies the amount of data your provider offers you per month?
Data plan.
What defines guidelines for how computers access a network?
Network standards.
What outlines characteristics of how devices communicate on a network?
Protocol.
What standard controls how network interface cards, routers, and modems share access to cables?
Ethernet.
What defines how business documents travel across transmission media?
EDI (electronic data interchange).
What is a set of protocols used by all computers and devices on the Internet?
TCP/IP (Transmission Control Protocol/Internet Protocol).
What allows computers and devices with wireless capability to communicate via radio waves?
WiFi.
What series of network standards specifies how two wireless devices communicate over the air?
802.11.
What is a network protocol that defines how two Bluetooth devices use short-range radio waves?
Bluetooth.
What describes devices communicating over a short range, usually less than 30 feet?
Bluetooth.
What is used for remote controls or data transmission within close proximity?
IrDA.
What is used in credit cards and smartphones to facilitate close-range communication?
NFC (near field communication).
What specifies how two UWB devices use short-range radio waves to communicate?
UWB (ultra-wideband).
What standard transmits data wirelessly via infrared light waves?
IrDA (Infrared Data Association).
What protocol defines how a network uses radio signals to communicate with a tag?
RFID (radio frequency identification).
What is a protocol that defines how a network uses close-range radio signals to communicate?
NFC (near field communications).
What can be computers, tablets, mobile phones, or smart home devices?
Nodes, or devices on a network.
What is also called a broadband modem and sends and receives data to and from a digital line?
Digital modem.
What uses a cable TV connection?
A cable modem.
What uses standard copper telephone wiring?
DSL modem.
What sends digital data from a computer to an ISDN line?
ISDN (Integrated Services Digital Network) modem.
What is a type of always-on physical connection established between two communications devices?
Dedicated line.
What combines multiple analog or digital signals into a single signal over a shared medium?
Multiplexing.
What enters a building through a single line, usually a coaxial cable?
The CATV signal.
What transmits on existing standard copper phone wiring?
DSL (Digital Subscriber Line).
What type of DSL supports faster downstream rates than upstream rates?
ADSL (asymmetric digital subscriber line).
What refers to both a circuit-switched telephone network system and communication standards?
ISDN (Integrated Services Digital Network).
What uses fiber-optic cable to provide extremely high-speed Internet access?
FTTP (Fiber to the Premises).
What use multiplexing so that multiple signals share the line?
Digital T-carrier lines.
What provides very fast data transfer rates and is usually affordable for medium to large companies?
T-carrier lines.
What is an amplifier used to improve reception and extend the range for your wireless router?
Booster (repeater).
What gains administrator-level access to a computer or network without detection?
Rootkit.
What connects directly to a network and provides a centralized location for storing programs and data?
Network attached storage (NAS).
What is a series of numbers and/or letters used to encrypt data sent between devices?
Wireless network key.
What constantly assesses the status of a network and alerts the administrator when a problem is detected?
Network monitoring software.
What monitors and logs packet traffic for later analysis?
Packet sniffer.
What occurs when cyberthieves intercept a paid Internet service?
IP hijacking.
What occurs when cyberthieves exploit paired Bluetooth devices?
Bluebugging.
What is the role of a network administrator?
To plan, design, purchase equipment for, set up, secure, and maintain a network.
What developed a code of ethics for system operators providing standards for network administrators?
USENIX.
What has access to vast amounts of data that needs to be protected?
Network administrator.
What is a third-party business providing networking services?
Value-added network (VAN).
What is a pane in a program window that lets you move between objects?
Navigation pane.
What is a crucial component of most organizations?
Data.
What is relied upon to organize data, making it easily accessible and secure?
Databases.
What is software that allows you to create, access, and manage a database?
Database management system (DBMS).
What uniquely identifies each record in a table?
Primary key.
What occurs when you store the same data in more than one place?
Data redundancy.
What acts as a portal for a database, enabling information sharing with a wide audience?
Database service, or a website.
What classifies data in a hierarchy where each higher level consists of items from the lower level?
Information technology (IT) professionals.
What in Access is a collection of related records stored on a storage medium?
Data file, called a table.
In the ASCII coding scheme, what does each byte represent?
Single character.
What is a combination of related characters or bytes and the smallest unit of data a user accesses?
Field.
What uniquely identifies each field in a database?
Field name.
What is a group of related fields in a database?
Record.
What is the highest level in the data hierarchy, containing fields and records?
Table.
What extracts data from a database based on specified criteria?
A query.
What is where each field is spaced out on the screen for easier interaction?
Data entry form.
What specifies the kind of data a field can contain?
Data type.
What is a unique number automatically assigned by the DBMS to each added record?
AutoNumber.
What refers to lengthy text entries, which may include separate paragraphs?
Memo.
What is a photo, audio, video, or document stored as a sequence of bytes in the database?
Object.
What contains data about each table in the database and each field in those tables?
Data dictionary, sometimes called a repository.
What is the process of comparing data with a set of rules to determine if it meets criteria?
Validation.
What is a popular query language that allows users to manage, update, and retrieve data?
Structured Query Language.
What consists of simple, English-like statements to specify data display or modification?
Query language.
What feature has a graphical user interface to assist users with retrieving data?
Query by example (QBE).
What allows users to design a report on the screen and retrieve data into the report design?
Report writer, also called a report generator.
What is a listing of activities that modify the contents of the database?
Log.
What uses logs and/or backups to restore a database when it becomes damaged?
Recovery utility.
What does the DBMS use to reenter changes made to the database since the last save?
Rollforward, also called forward recovery.
What does the DBMS use to undo changes made to the database during a certain period?
Rollback, also called backward recovery.
What is a backup plan in which changes are backed up as they are made?
Continuous backup.
What shows how data in one table relates to data in another table?
Relationship.
What is a field in one table that contains data from the primary key in another table?
Foreign key.
What connects each record in one table to one or more records in another table?
One-to-many relationship.
What is restricted to exactly one record in the table on each side?
One-to-one relationship.
What is rollback?
Rollback, also called backward recovery, is a backup plan in which changes are backed up as they are made.
What does continuous backup mean?
Continuous backup is a backup plan in which changes are backed up as they are made.
What is a relationship in a database?
A relationship shows how data in one table relates to data in another table and is one of the main advantages of using a database.
What is a foreign key?
A foreign key is a field in one table that contains data from the primary key in another table.
What is a one-to-many relationship?
A one-to-many relationship connects each record in one table to one or more records in another table.
What is a one-to-one relationship?
A one-to-one relationship is restricted to exactly one record in the table on each side of the relationship.
What is a many-to-many relationship?
A many-to-many relationship allows more than one record on the left side of the relationship to be connected to more than one record on the right side of the relationship.
What are NoSQL databases?
NoSQL databases, or nonrelational databases, resolve many of the weaknesses of relational databases.
What are key-value databases?
Key-value databases, also called key-value stores, create any number of key-value pairs for each record.
What is a key-value pair?
A key-value pair consists of two related items: a constant that defines the set (the key) and a variable that belongs to the set (the value).
What is a relational database management system (RDBMS)?
Access is designed to work with relational databases, so it more specifically is called a relational database management system (RDBMS).
What is database as a service (DBaaS)?
Database as a service (DBaaS) means the DBMS runs on servers owned by a cloud provider, and users access the database remotely through a browser.
What is a front-end database?
A front-end database is part of a split database that contains the user interface and other objects, but not the tables that are needed for an application.
What is a back-end database?
A back-end database is part of a split database that contains table objects and is stored on a file server that all users can access.
What do database administrators (DBAs) do?
Database administrators (DBAs) work with the back-end components to ensure a company’s business data is safe, secure, and well-managed.
What is an index in a database?
An index is a database object that is created based on a field or combination of fields.
What is a blockchain?
A blockchain is a series (or chain) of records stored in encrypted blocks across a network.
What is data visualization?
Data visualization is the process of presenting data graphically in the form of charts, maps, or other pictorial formats in order to understand the resulting information easily.
What is a consistency check?
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and their data is in the correct format.
What is a completeness check?
A completeness check verifies that a required field contains data.
What is a check digit?
A check digit is a number(s) or character(s) that is appended to or inserted in a primary key value.
What is a presence check?
A presence check, when enabled, requires the user to add information to a particular field and will not allow the user to leave a field blank.