1/114
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
two or more computers that are linked together.
A basic computer network can be described as
LAN
local area network
distance
The primary difference between a LAN and a WAN
Connection point
Each individual computer and component attached to a network is a
cables
In a traditional LAN, each node of the network is connected through:
MAN
metropolitan area network
router
The hardware device or software program that sends messages between networks is known as a:
NIC
network interface card
bits per second
Modem speed is measured in:
Bandwidth
The term for the amount of information transmitted through a communication medium in a certain amount of time
fiber-optic cables
type of cables uses light waves to carry information at high speed
firewall
helps block unauthorized access and data transfer
Trojan horse
A program that performs a useful task while simultaneously allowing destructive acts is a
Virus
An intentionally disruptive program that spreads from program to program or from disk to disk is known as
Worm
A type of virus uses computer hosts to reproduce itself
a denial of service attack
When customers of a Web site are unable to access it due to a bombardment of fake traffic, is is known as
encryption
The scrambling of code is known as
True
Information security is the practice of defending information from unauthorized access.
True
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers
False
Hoax viruses flood a targeted computer with so many requests that it cripples functionality.
True
The most complex type of firewall is the application proxy firewall
True
A router is a hardware component used to interconnect networks
4
How many layers are there in the TCP/IP protocol suite?
128
IPv6 addresses are how many bits long?
False
UDP provides sequencing, error control and flow control just like TCP
CAT 2, CAT 3, and CAT 5
What are standard twisted pair cables?
Contextual Computing
Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user?
Workplace Hub
Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user's existing technologies (including hardware, software, and services) into a one stop connected platform?
Non-Immersive, Semi-immersive, and Fully-immersive
Simulation types for implementing of virtual reality technology?
CNN, DNN, and LSTM
Deep Learning Algorithms?
Big Data Analytics
the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions
172.16.64.0
subnet
Class A
terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7
False
Decryption is the process of converting plaintext into ciphertext
False
Serial transmission is described as transmitting a group of bits at a single instant in time, which requires multiple paths
True
Malware refers to any computer program designed to surreptitiously enter a digital device.
False
Private-key functions involve the use of two keys during the process of Private-key encryption.
transport
Which OSI layer offers reliable, connection-oriented data communication services?
164.20.31.9
Which of the following is an IPv4 address?
EULA (End User License Agreement)
Agreement between the user and the software publisher
hot-plugging
When a peripheral device is connected or disconnected while the host device is operating
IoT smart sensors
work behind the scenes to collect data and use it to improve just about anything
Anonymizing data
What happens to the data they collect, however, can pose security and privacy risks
the time it takes for one pixel to change from black to white than back to black. 5 ms or less
What is the response rate in the context of image quality in display devices?
Offline (CD), Online, .exe (Windows), .dmg and .app (Mac), CNET, Tucows, Developer Website
Software Distribution
One-time purchase
The software remains the same as when it was purchased
Subscription
consumers pay an annual fee to use software; updates and upgrades are usually included in the pricing
Trial
consumers use a software product during a free trial period
Freemium
provides free use of a stripped-down or basic version of the product but requires payment for upgraded features
license agreements
displayed during the installation process; by clicking the I agree button, you consent to the terms of the license agreement
Open source software
Makes uncompiled program instructions-the source code- available to programmers who want to modify and improve the software. (Linux, FileZilla) Includes source code
Telecommunication
is the distance transfer of meaningful information from a source location to a destination location. Does this through cable (copper or fiber)
telephony
refers to the transmission of sound over wire or wireless
LAN
less than 5km, private, college campuses, single apartments, business offices
MAN
5 to 50 km, private/public, City networks,
Ring Topology
each device is attached along the same signal path to two other devices and forms a path in the shape of a ring
Bus
All devices are directly attached to a line and all signal pass through each of the devices
Wide Area Network (WAN)
More than 50 km, private/public, connects offices in different cities using leased lines
Star
all computers are connected to a central node, called a hub, which rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on a network
Tree
resembles an interconnection of star networks
Mesh
more interconnections between nodes at different levels, or even at the same level
Hybrid
A combination of two or more basic network topologies
VPN
Virtual Private Network
Distributed Computing
spreads users across several smaller systems, and limits the disruption that will be causes if one of the systems goes down
Centralized computing
involves accessing a central computer, called the mainframe, which does all processing associated with most tasks
Application Layer
The seven layer of the OSI model. A user interacts with a network primarily through applications running on a computer
Presentation Layer
The sixth layer of the OSI model. Translates between the application and the network. It also manages data encryption and decryption, such as the scrambling of system passwords.
Session Layer
The fifth layer in the OSI model. This layer establishes, maintains, and terminates sessions between two computing devices that are exchanging information
Transport Layer
The fourth layer of the OSI model. In this layer protocols ensure that information has successfully moved between two points on a network
Network Layer
The third layer in the OSI model. Responsible for how packets should be routed and switched through a network
Data Link Layer
The second layer in the OSI model. This layer defines physical addressing
Physical Layer
The lowest, or first, layer of the OSI model. Protocols in this layer that define the electrical and mechanical specifications for the interface between a device and transmission medium, fiber-optic cable, coaxial cable, or twisted pair
IPv4 addressing
A string of 32 bits. Consists of 4 octets
Class B address
Class B addresses span from 128 to 191, with a default subnet mask of 255.255.0.0.
Class A address
0 to 127, with
a default subnet mask of 255.0.0.0.
Class C
192-223, with a default subnet mask of 255.255.255.0.
Multicasting
group communication
encryption
transforms a data file so that its contents are hidden from unauthorized readers
malware
refers to any computer program designed to surreptitiously enter a digital device
Trojan horse
disguise malware as legitimate software
botnets
client-server network hidden from the victims
spam
unsolicited messages that are usually sent in massive numbers using electronic mail systems
phishing
an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS
pharming
redirects web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams
private key
An asymmetric encryption key that does have to be protected
public key
An asymmetric encryption key that does not have to be protected.
Class D
Multicasting
Class E
experimental, used for research
Quality of Service
measurement of the overall performance of a network
Latency
the delay that an application can tolerate in delivering a packet of data
Virtual Reality (VR)
a computer technology that uses VR headsets, in combination with interactive hardware and software, to generate realistic images, sounds, and other sensations that simulate a user's physical presence in a virtual or imaginary environment
contextual computing
the use of software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user.
Deep learning algorithms
Convolutional Neural Network (CNN), Deep Neural Network (DNN), Long Short-Term Memory (LSTM)
Direct Memory Access (DMA)
most sophisticated and very efficient means of dealing with IO. Data is transferred between a peripheral device and memory without the active intervention of a processor
unicast
one to one
multicast
one to group
broadcast
one to all
password entropy
log base 2 10^4
payload
the action carried out by malware code
code injection
the process of modifying an executable file or data stream by adding additional commands