Unit 3 - Networks and the Internet Flashcards

1
Q

AUP

A

Acceptable Use Policy
Policy that outlines what is allowed and what is not allowed while someone is using an organization’s technology services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control

A

The technology and techniques that can be used to control who has access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Spyware Software

A

Software that defends against spyware and adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-Virus Software

A

Software that defends against malware (viruses, worms, and trojan horses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric Reader

A

Identifies users by scanning for one or more physical traits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluetooth

A

Transmission standard that provides the protocol for mobile devices, computers, or smartphones to connect to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIPA

A

Short for Children’ Internet Protection Act; requires public schools and organizations block or filter pictures that may be obscene or pornographic in nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

COPPA

A

Short for Children’s Online Privacy Protection Act; requires parental consent before collecting information from people under thirteen years old.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Code of Ethics

A

Document that outlines a set of acceptable behaviors for a professional or social group; generally, it is agreed to by all members of the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Law Trademark

A

Designated by placing “TM” next to the trademark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer Addiction

A

Excessive use of a computer as a primary form of stress relief.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Network

A

A group of computers connected for the purpose of communication-sharing of data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Copyright

A

Protection given to songs, computer programs, books, and other creative works; any work that has an “author.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Name Service (DNS)

A

Converts the request between IP addresses and domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethernet

A

The standard interface for all wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ethics

A

A set of moral principles or the principles of conduct governing an individual or a group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Exploit

A

An attack that uses a vulnerability to harm a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Extranet

A

A LAN that can be accessed by users with special access rights outside of a business or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fair Use

A

A limitation on copyright law that allows for the use of protected works without prior authorization in specific cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTML Tag

A

HTML markup code enclosed in < > brackets; used to define how content is displayed on screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hyperlinks

A

Link to a webpage or other type of content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hypertext Markup Language (HTML)

A

Programming language used to create websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hypertext Transfer Protocol (HTTP)

A

Networking protocol used to distribute websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP Address

A

Short for internet protocol address; numeric address that provides an ID number for a computer on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Infringement

A

The violation of the rights of a copyright holder by using copyrighted works without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Intellectual Property

A

Property (as an idea, invention, or process) that derives from the work of the mind or intellect.

27
Q

Internet

A

Global network of smaller networks linking devices through TCP/IP.

28
Q

Intranet

A

Private network that can only be accessed by users with special permission and is typically set up in a private company or organization.

29
Q

Keystroke Logger

A

Records keystrokes in a file and sends the file to the author of the program.

30
Q

Local Area Network (LAN)

A

Computer network that links computers within a building.

31
Q

Malware

A

Malicious software used to launch attacks on a computer system.

32
Q

MAN

A

Metropolitan Area Network
A network within a large confined area such as a college campus, or company within an urban or suburban area.

33
Q

Near-Field Communication (NFC)

A

Set communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone.

34
Q

Network

A

Group of people or devices connected for the sole purpose of sharing data or resources.

35
Q

Network Adapter

A

Translates instructions from the operating system into data that can be sent over a network.

36
Q

Network Software Application

A

Software used to manage and monitor networks of all sizes; helps administrators deploy, manage and monitor a network.

37
Q

Patent

A

Protection for the invention of a new product or process.

38
Q

PAN

A

Personal Area Network
A smaller local network in which personal devices are in close range with one another.

39
Q

Plagiarism

A

Taking of another person’s work without any attribution and presenting it as your own.

40
Q

Protocol

A

Format or rule for transmitting data between devices.

41
Q

Registered Trademark

A

Trademark that has been examined, approved, and registered with the trademark office, such as the Patent and Trademark Office in the U.S.

42
Q

Resolve

A

The process of converting a domain name to an IP address.

43
Q

Router

A

An upper tier switch that can connect and route local network traffic as well as traffic from outside networks such as the Internet.

44
Q

Smart Card

A

Plastic card that contains a microchip that a card reader can scan to verify a person’s identity.

45
Q

Social Media

A

Term used to describe the sharing of media (photos, videos, audio, text messages) via a social network.

46
Q

Social Network

A

Website that connects its users by allowing them to communicate with each other, share pictures, share information, and share ideas.

47
Q

Software-Defined Networking (SDN)

A

Computer networking concept that separates the software from the hardware, making it easier to innovate and adapt the network to quickly meet changing network demands.

48
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol; a group of protocols that functions together for web-based communication.

49
Q

Trademark

A

A word, phrase, logo, shape, or sound that identifies a source of goods or services.

50
Q

Trojan Horse

A

An application that appears to do something useful while secretly causing damage to your computer system.

51
Q

Uniform Resource Locator (URL)

A

Address of an internet resource such as a website; must begin with a communication protocol such as HTTP.

52
Q

Virus

A

Computer code that inserts itself into an executable file.

53
Q

Web Page

A

Document written in HTML format that contains content prepared for the web.

54
Q

Website

A

A group of interconnected webpages with a system for navigation through all of the pages.

55
Q

Wi-Fi Protected Access (WPA)

A

Method of wireless encryption that offers capabilities for a large wireless network.

56
Q

Wide Area Network (WAN)

A

Computer network with all of the equipment spread over a large geographic area and is typically inclusive of many small networks or LANs.

57
Q

Wired Equivalent Privacy (WEP)

A

Commonly used method of network encryption; controlled by entering in a 128 bit or 256 bit key.

58
Q

Wired Network

A

Network that uses physical cables and connection boxes to connect devices.

59
Q

Wireless Access Point (WAP)

A

Wireless network connection box that enables computers on a network to connect wirelessly.

60
Q

Wireless Fidelity (Wi-Fi)

A

The standard interface technology for wireless networks.

61
Q

Wireless Network

A

Network that uses radio frequency signals to transmit data.

62
Q

World Wide Web

A

An interconnected network of documents written in Hypertext Markup Language (HTML) that can be accessed through the Hypertext Transfer Protocol (HTTP).

63
Q

Worm

A

An application that carries harmful programs such as a trojan horse or virus.