Building and Securing Computer Networks: Protocols, Routing, and Web Technologies

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Computing Device

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

2
New cards

Computing System

a group of computing devices and programs working together for a common purpose

3
New cards

Computing Network

a group of interconnected computing devices capable of sending or receiving data.

4
New cards

Path

the series of connections between computing devices on a network starting with a sender and ending with a receiver.

5
New cards

Bandwidth

the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.

6
New cards

Protocol

An agreed-upon set of rules that specify the behavior of some system

7
New cards

IP Address

The unique number assigned to each device on the Internet.

8
New cards

Internet Protocol (IP)

a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device

9
New cards

Router

A type of computer that forwards data across a network

10
New cards

Redundancy

the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.

11
New cards

Fault Tolerant

Can continue to function even in the event of individual component failures.

12
New cards

Datastream

Information passed through the internet in packets.

13
New cards

Packet

A chunk of data sent over a network.

14
New cards

Packet Metadata

Data added to packets to help route them through the network and reassemble the original message.

15
New cards

Transmission Control Protocol (TCP)

A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered

16
New cards

User Datagram Protocol (UDP)

A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets

17
New cards

Scalability

the capacity for the system to change in size and scale to meet new demands

18
New cards

DNS Spoofing

an attack involving manipulating DNS records to redirect users to a fraudulent website that may resemble the user's intended destination.

19
New cards

World Wide Web

a system of linked pages, programs, and files

20
New cards

The Domain Name System (DNS)

the system responsible for translating domain names like example.com into IP addresses

21
New cards

Uniform Resource Locator (URL)

the address of a given unique resource on the Web.

22
New cards

Hypertext Transfer Protocol (HTTP)

a protocol for computers to request and share the pages that make up the world wide web on the Internet

23
New cards

Hypertext Markup Language (HTML)

the standard markup language for documents designed to be displayed in a web browser.

24
New cards

Secure Sockets Layer (SSL)

a standard security technology for establishing an encrypted link between a server and a client—typically a web server.

25
New cards

Transport Layer Security (TLS)

a cryptographic protocol designed to provide communications security over a computer network.

26
New cards

Digital Certificate

a file that verifies the identity of a device or user and enables encrypted connections.

27
New cards

Cookies

text files with small pieces of data used to identify your computer as you use the network.