IST Midterm Review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

124 Terms

1
New cards

Computing Device

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

2
New cards

Computing System

a group of computing devices and programs working together for a common purpose

3
New cards

Computing Network

a group of interconnected computing devices capable of sending or receiving data.

<p>a group of interconnected computing devices capable of sending or receiving data.</p>
4
New cards

Internet Protocol (IP)

a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

5
New cards

Fault Tolerant

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

6
New cards

Packets

A single message can be made up of many 'packets' which you can add with the 'Add Packet' button.

7
New cards

Packet Length

Packets can only be 80 bits long.

8
New cards

Packet Metadata

16 bits are already used for packet metadata, data added to help route the messages.

9
New cards

Free Data in Packets

You only have 64 bits, or 8 ASCII characters free for each of your messages.

10
New cards

Traffic Reading Steps

Step 1: Open the Log Browser. Step 2: Filter to your traffic on all routers. Step 3: Read the traffic and answer the questions in your activity guide.

11
New cards

Packet Delivery

Packets can take different paths or be dropped, just like messages in the previous lesson.

12
New cards

Message Order

As a result, messages may arrive out of order or incomplete.

13
New cards

User Datagram Protocol (UDP)

Send all the packets but don't check if they all get through or arrive in the right order.

14
New cards

Transmission Control Protocol (TCP)

Number packets so they can be re-ordered, confirm all were received, resend any missing packets. Multiple back and forth confirmations between sender and receiver.

15
New cards

UDP Use Case

Useful when split seconds matter more than correcting errors, like video-conferencing, live streaming, online gaming.

16
New cards

TCP Use Case

Useful when accuracy matters more than saving a split second, like sending emails, photos, or just browsing websites.

17
New cards

Speed

Situations where doing something quickly was most important.

18
New cards

Accuracy

Experiences where being correct and precise was most important.

19
New cards

Speed AND Accuracy

Situations when both speed and accuracy are needed.

20
New cards

Datastream

Information passed through the internet in packets.

21
New cards

Packet

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all.

22
New cards

GET request

A request sent to the DNS to obtain the IP address of a user.

23
New cards

Net Neutrality

The principle that Internet service providers must treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, or method of communication.

<p>The principle that Internet service providers must treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, or method of communication.</p>
24
New cards

Internet Censorship

The control or suppression of what can be accessed, published, or viewed on the Internet.

<p>The control or suppression of what can be accessed, published, or viewed on the Internet.</p>
25
New cards

The Digital Divide

The gap between those who have easy access to computers and the Internet, and those who do not.

<p>The gap between those who have easy access to computers and the Internet, and those who do not.</p>
26
New cards

TLS

Transport Layer Security, a cryptographic protocol designed to provide communications security over a computer network.

27
New cards

HTTPS

Hypertext Transfer Protocol Secure, an extension of HTTP that uses SSL/TLS to provide a secure connection.

28
New cards

Certificate Authorities

Entities that issue digital certificates to verify the ownership of a public key.

29
New cards

Streaming App

An application that allows users to listen to audio or watch video content in real-time over the Internet.

30
New cards

Messaging App

An application that enables users to send and receive messages in real-time.

31
New cards

Email Client

A software application used to access and manage a user's email.

32
New cards

News Website

A website that provides news articles and updates.

33
New cards

Internet Radio

A digital audio service transmitted via the Internet.

34
New cards

Real-time Application

An application that processes data as it comes in, typically without delay.

35
New cards

Lower Latency

A reduced delay in data transmission.

36
New cards

Internet Fundamentals

Structure and function of the Internet.

37
New cards

Routing

Protocols and addressing systems.

38
New cards

Digital Citizenship

Digital footprints and their impact.

39
New cards

Netiquette

Online behavior ethics.

40
New cards

Binary Numbers

Basics of binary numbers and their conversions.

41
New cards

Data Compression

Understanding data compression types and uses.

42
New cards

Internet Tools

Tools for web browsing and their uses.

43
New cards

Internet Standards

Key internet communication standards.

44
New cards

IT Careers

Essential skills for IT roles.

45
New cards

Emerging Technologies

Basics of artificial intelligence (AI) applications.

46
New cards

Chatbots

Teachable Machines.

47
New cards

Domain Name System (DNS)

Functions and organization of the Domain Name System.

48
New cards

Bot/Robot

Automated programs designed to perform specific tasks.

49
New cards

Predictive Text

Technology that predicts and suggests text while typing.

50
New cards

Cybersecurity

Measures and practices to protect systems and networks from cyber threats.

51
New cards

Graphic User Interface (GUI)

Visual way users interact with computers using graphical icons.

52
New cards

Artificial Intelligence (AI)

Machines simulating human intelligence, like decision-making and learning.

53
New cards

Encryption

Process of converting data into a code to prevent unauthorized access.

54
New cards

Decryption

Converting encrypted data back into its original form.

55
New cards

SPAM

Unsolicited bulk emails, typically advertisements.

56
New cards

HTML

Coding language used to structure and display content on the web.

57
New cards

Digital Footprint

Collected information about a person across the internet.

58
New cards

Lossless Compression

Data compression that preserves all original data.

59
New cards

Lossy Compression

Data compression that removes some data to reduce file size.

60
New cards

Machine Learning

Field of AI where computers learn from data inputs to make predictions.

61
New cards

Data Packet

Small units of data transmitted over a network.

62
New cards

Compression

Reducing the size of a file or data for easier transmission or storage.

63
New cards

IPv4 and IPv6

Internet Protocol versions that provide unique addresses for devices.

64
New cards

Digital Divide

Gap between those with access to technology and those without.

65
New cards

Phishing

Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.

66
New cards

Algorithm

A step-by-step procedure for solving a problem or performing a task.

67
New cards

Firewall

A security system that monitors and controls incoming and outgoing network traffic.

68
New cards

Artificial Neural Network

A computing system inspired by the human brain, used in machine learning.

69
New cards

Big Data

Large and complex datasets that require advanced tools to analyze and interpret.

70
New cards

Cloud Computing

Using remote servers hosted on the internet to store, manage, and process data.

71
New cards

Cookies

Small data files stored on a user's computer by websites to remember preferences or track behavior.

72
New cards

Latency

Delay before data transfer begins following a request.

73
New cards

Modem

A device that connects a network to the internet.

74
New cards

Operating System

Software that manages hardware and software resources on a computer (e.g., Windows, macOS).

75
New cards

Peer-to-Peer Network (P2P)

A decentralized network where devices communicate directly without a central server.

76
New cards

Spam Filter

Software designed to detect and block unsolicited emails.

77
New cards

Teachable Machine

A machine learning model that can be trained to recognize patterns, objects, or actions.

78
New cards

Virtual Private Network (VPN)

Technology that creates a secure connection over the internet.

79
New cards

Pixel

The smallest unit of a digital image or display.

80
New cards

Cache

Temporary storage that speeds up access to frequently used data.

81
New cards

Hashing

Converting data into a fixed-length code, often used for data integrity checks.

82
New cards

Code Editor

A tool used to write and edit programming code.

83
New cards

Unicode

A standard encoding for representing text in computers, supporting most written languages.

84
New cards

Cloud Storage

Online space to save and access files from any device with an internet connection.

85
New cards

Two-Factor Authentication (2FA)

An extra layer of security requiring two forms of identification to access an account.

86
New cards

Binary

A number system that uses only two digits: 0 and 1.

87
New cards

Base of Binary

Binary is a base-2 system (two possible values for each digit).

88
New cards

Uses of Binary

Computers use binary to represent and process all types of data (e.g., text, images, sound).

89
New cards

Example of Binary

The binary number 1010 represents the decimal number 10.

90
New cards

Decimal

A number system that uses ten digits: 0 through 9.

91
New cards

Base of Decimal

Decimal is a base-10 system (ten possible values for each digit).

92
New cards

Uses of Decimal

It is the standard system for representing numbers in everyday life.

93
New cards

Example of Decimal

The decimal number 25 is written as 11001 in binary.

94
New cards

Binary to Decimal Conversion Method

Convert binary numbers to decimal by multiplying each binary digit (bit) by 2 raised to the power of its position, counting from right to left (starting at 0).

95
New cards

Steps for Binary to Decimal Conversion

1. Write the binary number. 2. Assign powers of 2 to each bit (starting from 0 on the right). 3. Multiply each bit by its corresponding power of 2. 4. Add up all the results to get the decimal number.

96
New cards

Example of Binary to Decimal Conversion

Binary: 1011

97
New cards

Bit

The smallest unit of data in computing, can be either 0 or 1.

98
New cards

Byte

A group of 8 bits. One byte can represent 256 different values (from 0 to 255).

99
New cards

Example of Byte

The number 10101100 in binary is one byte.

100
New cards

RGB (Red, Green, Blue)

A color model used to represent and display images in electronic systems.