ICOM MIDTERM REVIEWER Flashcards
Choose a quiet and well-lit area where you can work without distractions. Consider natural lighting, proximity to power outlets, and accessibility to the internet
Select the Location
Invest in a desk and chair that are comfortable and ergonomically designed. Ensure the chair provides good lumbar support and that the desk has ample space for your equipment and tasks.
Choose the Right Desk and Chair
Place your monitor at eye level and adjust its angle to minimize glare. Use a monitor stand or adjustable arm if needed.
Position Your Monitor
Set up your chair and desk ergonomically:
Ergonomic Setup
Keep your desk clean and organized. Only have essential items on your desk, such as your computer, keyboard, mouse, and a few frequently used accessories.
Organize Your Desk
Keep your keyboard and mouse within easy reach to minimize strain. Ensure they are at the same height and your wrists remain in a neutral position while typing
Keyboard and Mouse Placement
- Group similar cables together. Separate power cables from data cables to reduce electromagnetic interference.
Bundling
Utilize cable ties, clips, wraps, sleeves, or cable management boxes to bundle and secure cables together.
Use Cable Organizers
Use cable organizers like clips, ties, or cable sleeves to keep cables tidy and prevent tangling. Route cables along the edges of your desk or use cable trays to keep them off the floor.
Cable Management
can bundle multiple cables into one sleeve for a clean look. Cable management boxes can house power strips and cable bundles
Cable Sleeves and Management Boxes
tags to identify each cable’s purpose or destination. This simplifies tracing and identifying specific cables when needed.
Label Cables
to hide and protect cables along walls or under desks. These are especially useful for longer cable runs.
Cable Channels and Raceways
to route and conceal cables, keeping them off the floor and out of sight.
Under-Desk Cable Trays
Where possible, use wireless peripherals (e.g., wireless keyboard and mouse) and wireless networking to reduce the number of cables.
Wireless Technology
abbreviation of BIOS
Basic Input/output system
refer to software applications or programs that are packaged and distributed together with a larger software package or operating system.
Bundled Application
refers to software that comes pre- installed on a computer or device, often by the manufacturer or vendor, and is considered unnecessary or unwanted by many users.
Bloatware Application
refers to a software application that a user or organization wants, needs, or prefers to have installed on a computer or device.
desired application
is a collection of interconnected computers and other devices that can communicate and share resources with each other.
computer network
- is a small network that covers a limited geographic area, such as a single building, home, or office.
LAN
cover larger geographic areas and can span cities, regions, or even countries
WAN
connect multiple LANs within a metropolitan area and are often used by universities, corporations, and service providers to offer high-speed data transmission.
MAN
is an intermediate-sized network that typically covers a city or a large campus
MAN
technology allows wireless connections to a local area network, often used for connecting devices like laptops, smartphones, and IoT devices
Wi-Fi
connects devices within short distances for data sharing and peripheral connections.
Bluetooth
provide wireless connectivity for mobile devices, offering internet access and voice communication.
Cellular Networks
connections use orbiting satellites to establish wide-area network connectivity, often used in remote areas.
Satellite
physical network connection established using cables or wired infrastructure.
Wired Connection
cables often with RJ-45 connectors, are widely used to connect devices in local area networks (LANs) and wide area networks (WANs).
Ethernet
cables use light to transmit data, offering high-speed, long-distance connections, often used in high-speed internet and telecommunications networks.
Fiber Optic
– cables are used for cable television and some internet connections.
Coaxial
Cable
networking uses electrical wiring to transmit data, allowing network connections through power outlets.
Powerline
create secure and encrypted connections over public networks, enabling remote users or branch offices to access a private network securely.
VPN
Many networks use a combination of wired and wireless connections to optimize performance and coverage.
This includes scenarios like combining Ethernet with Wi-Fi or cellular data with Wi-Fi.
Hybrid network
is a type of network designed to meet the networking needs of small businesses, home offices, or individuals working from home.
Soho network
are the individual devices that make up a network.
Nodes
refers to the physical or logical layout of the network.
Topology
are rules and conventions that govern how data is transmitted and received on a network
Protocols
is a controlled network that allows selected external partners or customers to access certain parts of an organization’s intranet
Extranet
is a private network within an organization that uses internet technologies for internal communication and sharing of resources.
Intranet
is a networking device that directs data packets between networks, such as connecting a home LAN to the internet.
Router
is a networking device that connects devices within the same network, directing data to the specific device it’s intended for.
Switch
is a security device or software that monitors and controls network traffic to protect a network from unauthorized access and cyber threats.
Firewall
address is a unique numerical label assigned to each device on a network, allowing them to be identified and communicate with each other.
IP Address
is a system that translates human-readable domain names
DNS (Domain Name System)
allows a large network to be divided into smaller, more manageable subnetworks, helping with organization and network performance.
Subnet
Network security is a critical concern, involving measures to protect networks from cyber threats like malware, viruses, hacking, and data breaches
Cybersecurity