Unit 3 - Networks and the Internet Flashcards
AUP
Acceptable Use Policy
Policy that outlines what is allowed and what is not allowed while someone is using an organization’s technology services.
Access Control
The technology and techniques that can be used to control who has access to a computer system.
Anti-Spyware Software
Software that defends against spyware and adware.
Anti-Virus Software
Software that defends against malware (viruses, worms, and trojan horses).
Biometric Reader
Identifies users by scanning for one or more physical traits.
Bluetooth
Transmission standard that provides the protocol for mobile devices, computers, or smartphones to connect to communicate.
CIPA
Short for Children’ Internet Protection Act; requires public schools and organizations block or filter pictures that may be obscene or pornographic in nature.
COPPA
Short for Children’s Online Privacy Protection Act; requires parental consent before collecting information from people under thirteen years old.
Code of Ethics
Document that outlines a set of acceptable behaviors for a professional or social group; generally, it is agreed to by all members of the group.
Common Law Trademark
Designated by placing “TM” next to the trademark.
Computer Addiction
Excessive use of a computer as a primary form of stress relief.
Computer Network
A group of computers connected for the purpose of communication-sharing of data and resources.
Copyright
Protection given to songs, computer programs, books, and other creative works; any work that has an “author.”
Domain Name Service (DNS)
Converts the request between IP addresses and domain names.
Ethernet
The standard interface for all wired networks.
Ethics
A set of moral principles or the principles of conduct governing an individual or a group.
Exploit
An attack that uses a vulnerability to harm a system.
Extranet
A LAN that can be accessed by users with special access rights outside of a business or organization.
Fair Use
A limitation on copyright law that allows for the use of protected works without prior authorization in specific cases.
HTML Tag
HTML markup code enclosed in < > brackets; used to define how content is displayed on screen.
Hyperlinks
Link to a webpage or other type of content.
Hypertext Markup Language (HTML)
Programming language used to create websites.
Hypertext Transfer Protocol (HTTP)
Networking protocol used to distribute websites.
IP Address
Short for internet protocol address; numeric address that provides an ID number for a computer on a network.
Infringement
The violation of the rights of a copyright holder by using copyrighted works without permission.
Intellectual Property
Property (as an idea, invention, or process) that derives from the work of the mind or intellect.
Internet
Global network of smaller networks linking devices through TCP/IP.
Intranet
Private network that can only be accessed by users with special permission and is typically set up in a private company or organization.
Keystroke Logger
Records keystrokes in a file and sends the file to the author of the program.
Local Area Network (LAN)
Computer network that links computers within a building.
Malware
Malicious software used to launch attacks on a computer system.
MAN
Metropolitan Area Network
A network within a large confined area such as a college campus, or company within an urban or suburban area.
Near-Field Communication (NFC)
Set communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone.
Network
Group of people or devices connected for the sole purpose of sharing data or resources.
Network Adapter
Translates instructions from the operating system into data that can be sent over a network.
Network Software Application
Software used to manage and monitor networks of all sizes; helps administrators deploy, manage and monitor a network.
Patent
Protection for the invention of a new product or process.
PAN
Personal Area Network
A smaller local network in which personal devices are in close range with one another.
Plagiarism
Taking of another person’s work without any attribution and presenting it as your own.
Protocol
Format or rule for transmitting data between devices.
Registered Trademark
Trademark that has been examined, approved, and registered with the trademark office, such as the Patent and Trademark Office in the U.S.
Resolve
The process of converting a domain name to an IP address.
Router
An upper tier switch that can connect and route local network traffic as well as traffic from outside networks such as the Internet.
Smart Card
Plastic card that contains a microchip that a card reader can scan to verify a person’s identity.
Social Media
Term used to describe the sharing of media (photos, videos, audio, text messages) via a social network.
Social Network
Website that connects its users by allowing them to communicate with each other, share pictures, share information, and share ideas.
Software-Defined Networking (SDN)
Computer networking concept that separates the software from the hardware, making it easier to innovate and adapt the network to quickly meet changing network demands.
TCP/IP
Transmission Control Protocol/Internet Protocol; a group of protocols that functions together for web-based communication.
Trademark
A word, phrase, logo, shape, or sound that identifies a source of goods or services.
Trojan Horse
An application that appears to do something useful while secretly causing damage to your computer system.
Uniform Resource Locator (URL)
Address of an internet resource such as a website; must begin with a communication protocol such as HTTP.
Virus
Computer code that inserts itself into an executable file.
Web Page
Document written in HTML format that contains content prepared for the web.
Website
A group of interconnected webpages with a system for navigation through all of the pages.
Wi-Fi Protected Access (WPA)
Method of wireless encryption that offers capabilities for a large wireless network.
Wide Area Network (WAN)
Computer network with all of the equipment spread over a large geographic area and is typically inclusive of many small networks or LANs.
Wired Equivalent Privacy (WEP)
Commonly used method of network encryption; controlled by entering in a 128 bit or 256 bit key.
Wired Network
Network that uses physical cables and connection boxes to connect devices.
Wireless Access Point (WAP)
Wireless network connection box that enables computers on a network to connect wirelessly.
Wireless Fidelity (Wi-Fi)
The standard interface technology for wireless networks.
Wireless Network
Network that uses radio frequency signals to transmit data.
World Wide Web
An interconnected network of documents written in Hypertext Markup Language (HTML) that can be accessed through the Hypertext Transfer Protocol (HTTP).
Worm
An application that carries harmful programs such as a trojan horse or virus.