INTRO TO COMPUTING - MODULE 7 & 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/117

flashcard set

Earn XP

Description and Tags

SUMMATIVE ASSESSMENT REVIEWER

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

118 Terms

1
New cards

Computer Network

Is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.

2
New cards

Network Topology

The arrangement of a network which comprises of nodes and connecting lines via sender and receiver.

3
New cards

Bus Topology

It is a network type in which every computer and network device is connected to single cable. It transmits the data from one end to another in single direction. No bi-directional feature is in bus topology.

4
New cards

Ring Topology

forms a ring connecting all devices with its exactly two neighboring devices.

5
New cards

Star Topology

All the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the
central node.

6
New cards

Active Hub

The hub can be passive in nature i.e. not intelligent
hub such as broadcasting devices, at the same time the hub can be
intelligent and has repeaters on them known as __________

7
New cards

Mesh Topology

Every device is connected to another device via particular channel.

8
New cards

Hybrid Topology

Is a collection of two or more topologies which are described above.

9
New cards

Internet

It is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.

10
New cards
11
New cards

ARPANET (Advanced Research Project Agency Network)

It allows scientists at different physical locations to share
information and work together and function even if part of the network were disabled or destroyed by a disaster.

12
New cards

World Wide Web Consortium (W3C)

It oversees research and sets guidelines and standards.

13
New cards

Internet2

It connects more than 200 universities and 115 companies via a high-speed private network.

14
New cards

Access Provider

It is a business that provides individuals and organizations access to the Internet free or for a fee.

15
New cards
16
New cards
17
New cards

Regional ISP

It provides Internet access to a specific geographical area.

18
New cards

National ISP

It provides Internet access in cities and towns nationwide.

19
New cards

Domain Name

It is the text version of an IP address.

20
New cards

IP Address

It is a number that uniquely identifies each computer or device connected to the Internet

21
New cards

DNS Server

It translates the domain name into its associated IP address.

22
New cards

Web

It consists of a worldwide collection of electronic documents.

23
New cards

Web Site

It is a collection of related Web pages and associated items.

24
New cards

Web Server

It is a computer that delivers requested Web pages to your computer.

25
New cards

Web 1.0

It was a read-only, you can only use it to look for information.

26
New cards

Web 2.0

It refers to Web sites that provide a means for users to interact.

27
New cards
28
New cards

Browser

It allows users to access Web pages and Web 2.0 programs.

29
New cards

Home Page

It is the first page that a Web site displays

30
New cards

URL

A Web page has a unique address called a ______________

31
New cards

Downloading

It is the process of receiving information

32
New cards

Tabbed Browsing

It allows you to open and view multiple Web pages in a single Web browser window

33
New cards

Search Engine

Finds information related to a specific topic

34
New cards

Subject Directory

It Classifies Web pages in an organized set of categories

35
New cards

Instant Search Box

Some Web browsers contain an _____________to eliminate the steps of displaying the search engine’s Web page prior to entering the search text

36
New cards

Multimedia

It refers to any application that combines text with graphics, animation, audio, video and virtual reality.

37
New cards
38
New cards

Graphic

It is a digital representation of non-text information

39
New cards
40
New cards

Thumbnail

It is a small version of a larger graphic

41
New cards
42
New cards

Animation

It is the appearance of motion created by displaying a series of still images in sequence

43
New cards

Audio

It includes music, speech, or any other sound

44
New cards

Player Streaming

You listen to audio on your computer using a ___________ is the process of transferring data in a continuous and even flow

45
New cards

Video

It consists of images displayed in motion

46
New cards

Virtual Reality

It is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space

47
New cards

Plug-in

It is a program that extends the capability of a Web browse

48
New cards
49
New cards

Web Publishing

It is the development and maintenance of Web pages

50
New cards

E-mail

It is the transmission of messages and files via a computer network

51
New cards

E-mail Program

It allows you to create, send, receive, forward, store, print, and delete e-mail messages

52
New cards

Mailing List

It is a group of e-mail names and addresses given a single name

53
New cards

Subscribing

It adds your e-mail name and address

54
New cards

Unsubscribing

It removes your name

55
New cards

Instant Messaging

It is a real-time Internet communications service

56
New cards

Chat

It is a real-time typed conversation that takes place on a computer

57
New cards

Chat Room

It is a location on an Internet server that permits users to chat with each other

58
New cards

VoIP

It enables users to speak to other users over the Internet.

59
New cards

Newsgroup

It is an online area in which users have written discussions about a particular subject.

60
New cards

Message Board

It is a Web-based type of discussion group

61
New cards

FTP

It is an Internet standard that permits file uploading and downloading with other computers on the Internet

62
New cards

Computer Security Risk

Action that causes loss of or damage to computer system

63
New cards

Virus

It is a potentially damaging computer program

64
New cards

Worm

It copies itself repeatedly, using up resources and possibly shutting down computer or network

65
New cards

Trojan Horse

It hides within or looks like legitimate program until triggered

66
New cards

Payload Destructive Event

That is delivered when you open file, run infected program, or boot computer with infected disk in disk drive.

67
New cards

Macros

It can be a small program, or script, that automates common tasks. These scripts are usually run within other programs

68
New cards

Antivirus Program

It identifies and removes computer viruses and most also protect against worms and Trojan horses

69
New cards

Virus Signature

It is a specific pattern of virus code and also called the virus definition

70
New cards

Denial of Service Attack

It is an assault which disrupts computer access to an Internet service such as the Web or e-mail

71
New cards

Back Door

It is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource

72
New cards

Spoofing

It makes a network or Internet transmission appear legitimate

73
New cards

Firewall

It is a security system consisting of hardware and/or software that prevents unauthorized intrusion

74
New cards

Personal Firewall Utility

It is a program that protects personal computer and its data from unauthorized intrusion, monitors transmissions to and from computer and informs you of attempted intrusion

75
New cards

Audit Trail

It records access attempts

76
New cards

Access Control

It defines who can access computer & what actions they can take

77
New cards

Intrusion Detection Software

It analyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior

78
New cards

User name

It is a unique combination of characters that identifies user

79
New cards

Password

It is private combination of characters associated with the user name that allows access to computer resources

80
New cards

Biometric Device

It authenticates person’s identity using personal characteristic

81
New cards

Hardware Theft

It is act of stealing computer equipment

82
New cards

Hardware Vandalism

It is act of defacing or destroying computer equipment

83
New cards

Software Theft

It is act of stealing or illegally copying software or intentionally erasing programs

84
New cards

License Agreement

It gives right to use software, and a single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer

85
New cards

Product Activation

It allows user to input product identification number online or by phone and receive unique installation identification number

86
New cards

Business Software Alliance (BSA)

It promotes better understanding of software piracy problems

87
New cards

Encryption

A safeguard against information theft and process of converting plaintext (readable data) into ciphertext (unreadable characters)

88
New cards

Secure Site

It is Web site that uses encryption to secure

89
New cards

Digital Certificate

It is notice that guarantees Web site is legitimate

90
New cards

Certificate Authority

Authorized person or company that issues and verifies digital certificates

91
New cards

Secure Sockets Layer (SSL)

Provides encryption of all data that passes between client and Internet server

92
New cards

Noise

A unwanted electrical signal

93
New cards

Undervoltage

It drops in electrical supply

94
New cards

Overvoltage/Power Surge

A significant increase in electrical power

95
New cards

Surge Protector

It protects computer and equipment from electrical power disturbance

96
New cards

System Failure

Prolonged malfunction of computer

97
New cards

Uninterruptible Power Supply (UPS)

It is a surge protector that provides power during power loss

98
New cards

Backup

Duplicate of file, program, or disk

99
New cards

Full Backup

All files in computer

100
New cards

Selective Backup

It selects which files to back up