Networking Flashcards

1
Q

used to transfer signals between PCs within the local network and to remote devices on the Internet

A

Physical connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

uses standards called protocols. A protocol is a
formal description of a set of rules and conventions that govern how
devices on a network communicate.

A

Logical connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

interprets the data and displays the information in an
understandable form

A

The application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three requirements for internet connection

A

The physical, logical connection, the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a type of non-volatile memory used in computers and other electronic devices. It can be erased and reprogrammed multiple times.

A

EPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

s a type of non-volatile memory similar to EPROM, but it can be erased and reprogrammed using an electrical charge rather than UV light.

A

EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a type of magnetic storage medium typically held 1.44 MB of data, that was widely used from the 1970s through the early 2000s for storing and transferring data.

A

Floppy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is firmware embedded on a small memory chip on the motherboard of a computer. It is responsible for initializing hardware components and providing the essential low-level communication between the operating system and the hardware.

A

BIOS (Basic Input Output System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a printed circuit
board that provides network communication
capabilities to and from a personal computer

A

NIC (Network Interface Card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a device that provides the computer with
connectivity to a telephone line.

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

who break into systems for malicious purposes, such as stealing data, spreading malware, or causing harm (often referred to as “black hats”).

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

who may engage in ethical or legitimate hacking to improve security (often referred to as “white hats”).

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the most infamous crackers in history, Kevin Mitnick was involved in multiple high-profile computer break-ins during the 1980s and 1990s.

A

Kevin Mitnik

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between old ISP and new ISP

A

The old have telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HyperText Transfer Protocol

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is a set of rules

A

Protocol

17
Q

DARPA

A

Defense Advanced Research Project Agency

18
Q

What is ping testing connectivity

A

Measures the connection between two devices

19
Q

Ping 127.0.0.1

A

a command of loop back test in measuring connectivity.

20
Q

It is a common and frequently used network utility, it’s not built into the operating system itself. Instead, it’s typically a separate program that you can access from the command line.

A

Ping - an external command

20
Q

It is the address where the data packets will be sent to

A

IP Address

21
Q
A
21
Q

An interface software application that allows users to access and view information on world wide web

A

Web browser

21
Q

Small software programs extended the functions of web browser

A

Plug-ins

22
Q
A
23
Q
A
23
Q
A