SBA3 Flashcards
IP(Internet Protocol)
A set of rules that govern the format of data sent over the internet or local network
Secure Sockets Layer Certificate(SSL)
A certificate that allows authentication on a website and enables an encrypted connection
WAN
A telecommunication that connects over a large geographical area for the purpose of computer networking
MAN (Metropolitan Area Network)
A network that connects users with computer resources over a geographical area larger than that of a LAN but smaller than thatt of a WAN
PAN
A network that interconnects devices in the vicinity of one’s personal workspace
LAN
A network that interconnects devices within a limited area such as a residence or school
Access Rights
Permissions granted to users to access certain resources on a network
GAN
- A network comprised of other interconnected networks that cover an unlimited geographical area
- Used to access information and resources anywhere in the world
- Global communication
The internet, interconnected corporate networks
HTTP(Hypertext transfer protocol)
- The foundation of data communication for the world wide web
- An application protocol for distributed and collaborative information systems
VoIP
Voice over Internet Protocol
- A technology that allows one to make calls over a broadband internet connection rather than a regular phone line
FTP
File transfer protocol
A standard network protocol that is used to send files between a client and a server in a network
Routers
- Devices that forward data packets between networks
- They perform the traffic directing function on the internet
Bandwidth
The maximum rate of data transfer across a given path
Broadband
A high-capacity transmission technique that uses a wide range of frequencies allowing many messages to be sent simultaneously
NFC
Near Field Communication
A set of communication protocols that allow two devices, one usually being a portable device) to communicate with one another within a 4cm vicinity
RFID
A technology that uses electromagnetic fields to identify and track tags attached to objects
Mesh Topology
- A topology in which each node relays data in a network
- All nodes work together to distribute the data in a network
Bus topology
A topology where the nodes are connected in a daisy chain by a linear sequence of buses
Ring topology
A network topology where each node is connected to two other nodes forming a continuous pathway for signals in each node
Star topology
A network topolofy where each network device is connected to a central hub
Backbone cable
Fibre optic cables that are used for high speed connections over long distances
Connections
Twisted pair cables are used for connecting devices within a network
STP
Cables that are shielded to protect the transimission from external intereference
UTP
Cables that do not have shielding to protect from external interference, usually used in ethernet network
Cloud Computing
The delivery of computing services over the internet
Cloud storage
A service model in which data is maintained, managed, and made available to users over a network
BYOD
A company policy where employees are allowed to bring their own devices to work to access company applications and information
Digital divide
The gap between those who have ready access to computers and internet and those who do not
Mbps VS MB
Mbps: a unit of data transfer equal to 1000 bits
MB: a unit of digital information equal to 1024kb
DM
A private form of communication between social media users
Worms in networks
Malware that replicates itself to spread to other computers, often uses parts of the OS that are automatic
EULA
Contract between the user and the software manufacturer stipulation how the software may be used
AUP
A set of rules the user must agree to in order to access or use the internet or network
Vlog
A blog where the postings are primarily videos
Plug-in
A software component that adds a certain feature to another existing program
Telecommunicating and wifi Telecommunicating
Working in an environment other than a traditional office space, usually at home with internet
Types of harassment
Doxxing
Trolling
Cyber bullying
Wi-Fi
Wireless Fidelity
A technology that allows electronic devices to connect to a WLAN using certain protocols
Precautions for gamers
- Use two-step authentication
- Create strong and unique passwords
- Do not give out personal information
- Keep software and devices updated
Secure password guidelines
- Use 12 or more characters
- Use a combination of letters, numbers and symbols
- Do not use guessable information
Hardware related problems
- Interference: Other electronic devices can interfere with wireless signals
- Router: A faulty or outdated router can cause lag
- Network card issues: Faulty network interface cards can cause disconnections
Network performance
- Throttling: the intentional slowing down of the internet speed by an internet service provider
- Spacing: the management of network traffic to guarentee performance, improve latency or increase usable bandwidth
- Piggybacking: using someone else’s internet connection without permission
ISP
Internet service provider
A company that provides individuals and companies access to the internet
Chatbox
A software application used to conduct conversations over text instead of engaging with a human
Vitual Assistant
An AI software that can perform tasks or services for an individual based on the request
DDos
Distributed Denial of service attack
Access to an online service is made inaccessible by overwhelming it with traffic from many sources
Keylogging
- Can capture keyboard strokes and expose important information
- Biometric devices and hardware tokens cannot be keylogged as they do not rely of keyboard input
Big data
Large amounts of data that are analysed for insights to improve decisions
Additional users
- Predictive analytics
- Personal marketing
- Healthcare advancements
Browser plug-ins
- Ad blockers
- Password managers
- Web developer tools