Unit 4 new Flashcards

1
Q

Define Network

A

Two or more computers or digital devices connected in order to share data and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Local area network (LAN)

A

Computer network used in a certain premises for private use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Wireless local area network (WLAN)

A

Local area network accessed using radio wave communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Wide area network (WAN)

A

Network of networks connecting local area networks over large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Internet

A

Global public system of interconnected computers over a large global area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Protocols

A

Sets of rules governing how devices communicate with each other through networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Wi-Fi

A

A protocol allowing computers and other devices to connected to the internet or communicate with one another wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Bluetooth

A

Protocols for short-range wireless connection between two separate devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Network interface card (NIC)

A

Printed circuit board allowing the computer to communicate with other devices over a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Media access control (MAC) address

A

Serial number unique to each device used to identify it on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define HUB

A

Device used for connecting computers to form a network, broadcasting to all connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Network traffic

A

Overall network usage caused by all the data being transmitted at a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Network switch

A

Device used for connecting computers to form a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Zero login

A

Method of authentication not requiring a user to login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define malware

A

Software designed to gain unauthorized access to another person’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Anti-malware software

A

Software used to prevent, detect and neutralize malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Quarantine

A

Placing a certain file suspected to be a malware into a specific area of the device’s storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Electronic-conference

A

Meeting between individuals who are not in the same location using communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Audio-conference

A

People in different locations using technology to talk to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Video-conference

A

People in different locations using technology to talk to each other with live video feed with the help of a camera.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define Bridge

A

Device for linking separate segments of a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Router

A

Device for transmitting data between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Data packet

A

Small parts of network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define IP address

A

Set of numbers used to identify a particular computer on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define Packet switching

A

When certain areas of the network are too busy to carry the packets, they are switched to emptier circuits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define TCP/IP

A

Protocol used by device to connect and communicate over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define Intranet

A

Communication system solely within a company or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define Extranet

A

Communication system for a particular company or organization that can be accessed from the internet by other parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define Cloud computing

A

Delivery of computer services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define Server

A

Computer that provides services to other computers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define Hacker

A

person who does hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define Cloud storage

A

Storage of digital data on remote servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define Hack

A

To gain unauthorized access to data in a system or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define Encryption

A

Process of turning information into a form that only the intended person can understand through decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define Decryption

A

Process of recovering the original text from encrypted text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define Asymmetric encryption

A

Method of encryption that uses two different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define Key

A

Piece of information used for encrypting and decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define Firewall

A

Software or hardware devices that protects against unauthorized access to a network or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define Authentication

A

Process or action of proving or showing something to be true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define Password

A

Secret word or phrase that must be used to gain access to a something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define Strong password

A

Password that is difficult to detect by humans and computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define Biometric methods

A

Technology that analyzes unique personal physical characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Define Smart card

A

Plastic card with built-in processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Define Physical token

A

Personal device that ensures a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Define Electronic token

A

A digital currency used as a method of exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Define Webinar

A

Teaching sessions taking place online that gives others the opportunity to ask questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Define Web-cast

A

One-way, non-interactive communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Define Web-conference

A

A live meeting held on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define ethernet

A

Computers communicating through wires in a LAN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Define LAN segment.

A

A LAN network being split into different parts, each part is a LAN segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Define passive attack.

A

A type of hacker attack that leads to no changes in the network data or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Define Routing table.

A

A database inside a router that keeps track of paths to determine which way to forward traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Define encryption

A

Scrambling data into a form that cannot be understood by unintended recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Define virus

A

Computer program hidden within another program or file that replicates itself and spreads through connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Define worm

A

Spreads by making thousands of copies of itself without existing inside the computer files and without human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Define trojan.

A

Malware disguised as genuine applications or files that harm the computer.

57
Q

Define magnetic stripes.

A

Magnetic stripes are thin layers of magnetic material that store digital data through magnetized patterns.

58
Q

Define packet part- header.

A

Contains the addresses of source, destination and position of the packet.

59
Q

Define packet part- body

A

Contains the main message or payload.

60
Q

Define packet part- footer.

A

Informs receiving device that the end of the packet has been reached and ensures packet is intact.

61
Q

Define spyware

A

Spies on computer activity to gain access to vital information.

62
Q

Define behavioral biometrics

A

Uniquely distinguished patterns in the behavior of device users.

63
Q

Define a weak password

A

Password that can easily be guessed or discovered by hackers.

64
Q

Define adware

A

Malware that provides the devices with advertisements and collects advertisement information from the computer without the user’s consent.

65
Q

Define physical biometrics.

A

Data relates to physical aspect of a person’s body.

66
Q

Define identification

A

To identify a person in a crowd..

67
Q

Define biometric verification

A

To make sure a person is who they claim to be.

68
Q

Define screening

A

To match a person who may be in a watchlist.

69
Q

Define contact smartcard

A

Smartcard that needs to be inserted into the reader.

70
Q

Define contactless smartcard.

A

Needs to be held close to the reader and data is transferred with radio waves.

71
Q

What are the uses of network?

A

(1) Computer-to-computer communication.
(2) Communication between computers and other devices.
(3) Mobile phone networks.
(4) Smart devices.
(5) Download videos and files.
(6) Transmitting media.

72
Q

What are the behaviors of hub?

A

(1) All computers plug into hub with a cable.
(2) Received message is always given to all connected computers.
(3) Only allow one device at a time to transmit messages.
(4) Cannot send messages to a certain intended device, this may lead to an overload and reduction of speed.

73
Q

What are the behaviors of switches?

A

(1) Read destination and addresses and send them to intended computers.
(2) Build up a table of all the MAC addresses on the network.
(3) Cut down unnecessary traffic.
(4) Can send and receive information at the same time.

74
Q

What are the contents in a packet?

A

(1) Header.
(2) Body.
(3) Footer.

75
Q

What are the behaviors of Wi-Fi?

A

(1) Communication with radio waves.
(2) Range of up to 100 meters.
(3) Device cannot communicate directly.
(4) Many users can be supported.
(5) High level of security.
(6) Fast data transfer.

76
Q

What are the advantages of cloud storage?

A

(1) Data will be secure in case problems at site.
(2) Data can be accessed from anywhere in the world.
(3) No need to buy expensive storage device.
(4) Many users can access.

77
Q

What are the behaviors of Bluetooth?

A

(1) Communication with radio waves.
(2) Range of 10 meters.
(3) Devices connect directly.
(4) Fewer users supported.
(5) Lower level of security.
(6) Low data transfer.

78
Q

What are the disadvantages of cloud storage?

A

(1) Needs internet connection.
(2) Download and upload speed affected by internet.
(3) Company may be targeted by hackers.
(4) Less control of data.
(5) Storing all types of data with cloud may not be permissible.

79
Q

What are the types of network?

A

(1) LAN.
(2) WLAN.
(3) WAN.

80
Q

Explain the functionality of local area networks.

A

Local area networks used in schools, homes and office that allow printers, games and other software applications to run. Lan can be connected to devices through cables or through wireless connection.

81
Q

What are the types of LAN?

A

(1) WLAN (wireless LAN)
(2) LAN (Connected with cable)

82
Q

Explain the functionality of WLAN.

A

Can be used from anywhere in the area without a cable from multiple devices.

83
Q

Explain the functionality of WAN.

A

Connects separate LANs over a wide geographical area. This is used to connect cities and countries. This allows computers in one location to communicate with computers all over the globe.

84
Q

What are the types of network devices?

A

(1) Network interface card (NIC).
(2) Hubs.
(3) Switches.
(4) Bridge.
(5) Router.

85
Q

Explain the functionality of bridges.

A

Connect different LAN segments together.

86
Q

What are the advantages of using bridge?

A

(1) Allow the prevention of unintended transmissions going to a different segment.
(2) Isolating networks and preventing the spread of harmful networks.
(3) Prevents users from accessing information they shouldn’t.

87
Q

What are the different types of internet environments?

A

(1) Internet.
(2) Intranet.
(3) Extranet.

88
Q

Explain the functionality of internet.

A

Global network of interconnected computers used to connect people and organizations across the globe

89
Q

Explain the functionality of TCP/IP.

A

Sets the rules of protocols used to direct data and ensure the correct data reaches the correct computer.

90
Q

Explain the functionality of intranet.

A

It is a private computer network within a certain organization that contains webpages about the organization. It cannot be accessed by outside parties as it is separate from the global network.

91
Q

Explain the functionality of extranet.

A

An intranet that can be accessed by outside individuals and organizations, this can be used to send messages, data and information outside the organization.

92
Q

Explain the functionality of biometrics.

A

Biometric data is the data that is collected from the physical characteristics of a person. It should be something that everyone possesses and is permanent.

93
Q

What are the types of biometrics?

A

(1) Physical biometrics.
(2) Behavioral biometrics.

94
Q

What are the commmon uses for using biometrics.

A

(1) Verification.
(2) Identification.
(3) Screening.

95
Q

Explain the functionality of physical token.

A

Identity can be verified with a physical object rather than a password or key phrase.

96
Q

Explain the workings of malware.

A

Malicious software designed to gain access and steal information from other computers or damage other computers without the user’s consent and disrupt the functioning of the computer system.

97
Q

What are the disadvantages involving physical token?

A

(1) May be lost, forgotten, or stolen.
(2) Some methods use mobile phones.

98
Q

What are the types of malware?

A

(1) Virus.
(2) Worm.
(3) Trojan.
(4) Spyware.
(5) Adware.

99
Q

Explain the functionality of audio-conferencing.

A

Participants use their phones to dial into a central system that connects them without visual communication, as the members cannot see each other or any presentations. Nor can they easily tell who is talking.

100
Q

Explain the functionality of video conference.

A

Allow participants to talk to each other and see each other. They can also tell who is speaking. Video conferences require the same equipment as web conferences but usually have a dedicated room and separate high quality equipment and secure internet connection.

101
Q

What are the methods of electronic-conferencing?

A

(1) Video and web conferencing.
(2) Audio conferencing.

102
Q

Explain the functionality of video-conferencing and web-conferencing.

A

Allow participants from different areas to not only communicate vocally but express themselves visually as well.

103
Q

What is a webcast?

A

Online meeting where host presents information with audio and video stream over the internet.

104
Q

What are the types of web-conferencing?

A

(1) Webcasts.
(2) Webinar.

105
Q

Explain the functionality of web conference.

A

Participants can speak to each other in a meeting that takes allows multiple participants to connect and work together visually with the help of their devices.

106
Q

What is a webinar?

A

Online teaching sessions that take place and allow the host and participants to ask and answer questions online.

107
Q

What equipment is needed for video and web conferencing?

A

(1) Microphone.
(2) Speaker / headphones.
(3) Video camera.
(4) A screen display and monitor.
(5) Internet connection.
(6) Web-conferencing software.

108
Q

Explain the functionality of Cloud Computing

A

Cloud computing allows users to use and access applications and files that are store in remote servers.

109
Q

What are the advantages of using cloud computing for businesses?

A

(1) Lower maintenance costs.
(2) Software is automatically upgraded.
(3) Employees can work from anywhere.
(4) Data is automatically backed up.
(5) Employees can collaborate on documents.

110
Q

What are the disadvantages of using cloud computing for businesses?

A

(1) Internet access required.
(2) Organization has less control and is more reliant on providers.
(3) Servers may be attacked by hackers.

111
Q

Explain the importance of security of computer networks.

A

Computer networks must be kept secure to ensure the protection of sensitive data from data interception and theft.

112
Q

Explain the functionality of firewall.

A

Devices that protect against unauthorized access from a network. They can also be used to prevent communications from entering the network and prevent users from accessing the internet.

113
Q

Explain the functionality of authentication.

A

A method of determining if whether the individual is who they declare to be on a network.

114
Q

What are the methods of authentication?

A

(1) Password.
(2) Biometric methods.
(3) Magnetic stripe.
(4) Smart cards.
(5) Physical tokens.
(6) Electronic token.
(7) Zero login.

115
Q

What is Tethering?

A

Linking of one device to another to connect to the internet.

116
Q

What are the security measures to prevent infection?

A

(1) Install anti-malware.
(2) Software to scan all storage media.
(3) Install firewall.
(4) Update device.
(5) Install security updates.
(6) Install anti-spyware.
(7) Avoid opening emails from unknown sources.
(8) Scan files before downloading.
(9) Download programs from trusted websites.
(10) Read security warnings.
(11) Be aware of suspicious streaming websites.

117
Q

Explain the functionality of networks.

A

Connect computers and other digital devices to ensure they can communicate and send data to each other.

118
Q

Explain the functionality of Wi-Fi.

A

Sets out how data is transmitted on wireless LAN.

119
Q

Explain the functionality of Bluetooth.

A

allows the linking of personal devices over short distances.

120
Q

Explain the functionality of network interface card (NIC)

A

A network adapter that connects a computer to a network and reformats data sent from a computer to a required format.

121
Q

Explain the functionality of HUB.

A

A central point in a network from where all the signals from individual computers are sent.

122
Q

Explain the functionality of switch

A

Handles messages by inspecting the MAC address and sending the message to the specific correct device.

123
Q

Explain the functionality of routers.

A

Routers allow different networks to communicate and allow many computers to share an internet connection. They transmit incoming data to the correct computer on the network.

Routers have a routing table through which they can understand where to forward data. This allows data to take different routes to the target network.

124
Q

What is the process used by routers for routing?

A

(1) Source computer splits data into different packets with cable to reduce strain on bandwidth to avoid slowing the network.
(2) Packets are sent through cable or wireless network.
(3) Routers on the network inspect each packet to find the destination with the configuration table.
(4) The routers balance the load between networks.
(5) The packets can be routed around problematic routers.
(6) Final router sends data to the correct recipient.

125
Q

Explain the functionality of passwords.

A

Secret word or phrase to prove one’s identity for them to gain authorization.

126
Q

What are the methods to make password strong?

A

(1) At least 8 characters long.
(2) Contain both number and letters.
(3) Contain both upper and lower case letters.
(4) Contain at least 1 symbol.
(5) Never use identifiable items.

127
Q

What are the methods to ensure password is secure?

A

(1) Strong password.
(2) Changing password regularly.
(3) Never reusing previous passwords.
(4) Never writing password down.
(5) Never sharing passwords with other users.

128
Q

What is the functionality of magnetic stripes?

A

Personal and security data is encoded into the magnetic stripe of a card and can be read by a reader.

129
Q

What is the functionality of smart smartcards?

A

Contain computer chip that can send data to a reader when brought into contact with it for authentication.

130
Q

What are the types of smartcard?

A

(1) Contact smartcard.
(2) Contactless smartcard.

131
Q

What is the functionality of zero login?

A

Login not by a physical features or passwords but using artificial intelligence to identify people with how they behave. This eliminates the use for complex passwords and documentation.

132
Q

Explain the functionality of anti-malware.

A

Software designed to reduce the chances of a device being affected by malware and to also detect, find and delete pre-existing malware and delete them, then clear up damage made by malware on the computer.

133
Q

Explain the behavior of worm.

A

A malware with an independent existence that makes thousands of copies of itself and sends itself to other computers making computers slow in the process.

134
Q

Explain the behavior of virus.

A

Computer program hidden within another program that replicates itself and passes itself to other computers.

135
Q

Explain the behavior of trojan.

A

It infects the computer when the user thinks they are downloading legitimate software or through emails. It damages or deletes files and system information and adds new icons.

136
Q

Explain the behavior of adware.

A

Displays advertisement on computers and redirects search requests to advertising websites while collecting marketing-type data about users. The user may have to pay a fee to get adware removed.

137
Q

Explain the behavior of spyware.

A

Comes packaged with other software and spies on computers then sends sensitive information to other computers.

138
Q

What is the advantage of video and web conferencing over face-to-face meetings?

A

(1) Participants can be seen and heard without having to travel.
(2) Can be organized quickly.
(3) Allows employees to work from home, cutting down costs.
(4) Encourages collaboration between colleagues.

139
Q

What is the disadvantage of video and web conferencing over face-to-face meetings?

A

(1) Never as successful as meeting in person.
(2) Hardware and software can be expensive.
(3) Hardware and software can malfunction.
(4) User may not be able to see all participants.
(5) Online meetings may be during inconvenient time zones.