1/249
These flashcards cover key terms and definitions related to networking concepts, data management, database structures, and encryption methods as outlined in the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Open System Interconnection (OSI)
A seven-layer networking framework used to standardize how data is transmitted between systems.
Physical Layer
The first OSI layer that transmits raw bits as electrical, light, or radio signals through physical hardware.
Data Link Layer
The second OSI layer that encodes data into frames and manages error detection, flow control, and network access.
Network Layer
The third OSI layer responsible for routing, addressing, and forwarding packets between networks.
Transport Layer
The fourth OSI layer that ensures reliable, complete, end-to-end data delivery between hosts.
Session Layer
The fifth OSI layer that establishes, manages, and terminates communication sessions between applications.
Presentation Layer
The sixth OSI layer that formats, encrypts, and translates data so applications can understand it.
Application Layer
The seventh OSI layer that provides network services directly to end users such as email and file transfer.
Network Topology
The layout of a network that determines how devices are connected and communicate.
Node
Any device on a network that has a unique network address.
Mesh Topology
A network topology where devices are connected with many redundant paths.
Star Topology
A network topology where all devices connect to a central hub.
Bus Topology
A network topology where all devices share a single central backbone cable.
Ring Topology
A network topology where all devices are connected in a closed loop.
Tree Topology
A hybrid topology that combines star and bus topologies for large networks.
Algorithm
A step-by-step procedure used to solve a problem with a defined stopping point.
Cloud Computing
Delivery of software, platforms, or infrastructure as services over the internet.
Database Management System
Software that interacts with the user, applications, and the database itself to capture and analyze data.
Data Warehouse
A centralized collection of databases used for analysis and reporting.
Event-Driven Data Warehouse
A data warehouse that processes data based on business events rather than scheduled batches.
Batch Processing
Processing that updates data in groups at scheduled times.
Real-Time Processing
Processing that occurs immediately as data is received.
Information Technology (IT)
The use of computers, software, and networks to process information.
Risk Analysis
The process of identifying assets, threats, vulnerabilities, and prioritizing risks.
Unique Identifier / Primary Key
A field that uniquely identifies each record in a database.
Public Key Encryption
An encryption method that uses a public key to encrypt data and a private key to decrypt it.
Scripting Languages
Interpreted languages such as JavaScript, ASP, JSP, PHP, Perl, Tcl, and Python.
Security Best Practices
Security principles based on what you know, what you have, and what you are.
Business Intelligence
Tools and techniques used to analyze raw data for decision-making.