1/117
SUMMATIVE ASSESSMENT REVIEWER
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Computer Network
Is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
Network Topology
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver.
Bus Topology
It is a network type in which every computer and network device is connected to single cable. It transmits the data from one end to another in single direction. No bi-directional feature is in bus topology.
Ring Topology
forms a ring connecting all devices with its exactly two neighboring devices.
Star Topology
All the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the
central node.
Active Hub
The hub can be passive in nature i.e. not intelligent
hub such as broadcasting devices, at the same time the hub can be
intelligent and has repeaters on them known as __________
Mesh Topology
Every device is connected to another device via particular channel.
Hybrid Topology
Is a collection of two or more topologies which are described above.
Internet
It is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
ARPANET (Advanced Research Project Agency Network)
It allows scientists at different physical locations to share
information and work together and function even if part of the network were disabled or destroyed by a disaster.
World Wide Web Consortium (W3C)
It oversees research and sets guidelines and standards.
Internet2
It connects more than 200 universities and 115 companies via a high-speed private network.
Access Provider
It is a business that provides individuals and organizations access to the Internet free or for a fee.
Regional ISP
It provides Internet access to a specific geographical area.
National ISP
It provides Internet access in cities and towns nationwide.
Domain Name
It is the text version of an IP address.
IP Address
It is a number that uniquely identifies each computer or device connected to the Internet
DNS Server
It translates the domain name into its associated IP address.
Web
It consists of a worldwide collection of electronic documents.
Web Site
It is a collection of related Web pages and associated items.
Web Server
It is a computer that delivers requested Web pages to your computer.
Web 1.0
It was a read-only, you can only use it to look for information.
Web 2.0
It refers to Web sites that provide a means for users to interact.
Browser
It allows users to access Web pages and Web 2.0 programs.
Home Page
It is the first page that a Web site displays
URL
A Web page has a unique address called a ______________
Downloading
It is the process of receiving information
Tabbed Browsing
It allows you to open and view multiple Web pages in a single Web browser window
Search Engine
Finds information related to a specific topic
Subject Directory
It Classifies Web pages in an organized set of categories
Instant Search Box
Some Web browsers contain an _____________to eliminate the steps of displaying the search engine’s Web page prior to entering the search text
Multimedia
It refers to any application that combines text with graphics, animation, audio, video and virtual reality.
Graphic
It is a digital representation of non-text information
Thumbnail
It is a small version of a larger graphic
Animation
It is the appearance of motion created by displaying a series of still images in sequence
Audio
It includes music, speech, or any other sound
Player Streaming
You listen to audio on your computer using a ___________ is the process of transferring data in a continuous and even flow
Video
It consists of images displayed in motion
Virtual Reality
It is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space
Plug-in
It is a program that extends the capability of a Web browse
Web Publishing
It is the development and maintenance of Web pages
It is the transmission of messages and files via a computer network
E-mail Program
It allows you to create, send, receive, forward, store, print, and delete e-mail messages
Mailing List
It is a group of e-mail names and addresses given a single name
Subscribing
It adds your e-mail name and address
Unsubscribing
It removes your name
Instant Messaging
It is a real-time Internet communications service
Chat
It is a real-time typed conversation that takes place on a computer
Chat Room
It is a location on an Internet server that permits users to chat with each other
VoIP
It enables users to speak to other users over the Internet.
Newsgroup
It is an online area in which users have written discussions about a particular subject.
Message Board
It is a Web-based type of discussion group
FTP
It is an Internet standard that permits file uploading and downloading with other computers on the Internet
Computer Security Risk
Action that causes loss of or damage to computer system
Virus
It is a potentially damaging computer program
Worm
It copies itself repeatedly, using up resources and possibly shutting down computer or network
Trojan Horse
It hides within or looks like legitimate program until triggered
Payload Destructive Event
That is delivered when you open file, run infected program, or boot computer with infected disk in disk drive.
Macros
It can be a small program, or script, that automates common tasks. These scripts are usually run within other programs
Antivirus Program
It identifies and removes computer viruses and most also protect against worms and Trojan horses
Virus Signature
It is a specific pattern of virus code and also called the virus definition
Denial of Service Attack
It is an assault which disrupts computer access to an Internet service such as the Web or e-mail
Back Door
It is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource
Spoofing
It makes a network or Internet transmission appear legitimate
Firewall
It is a security system consisting of hardware and/or software that prevents unauthorized intrusion
Personal Firewall Utility
It is a program that protects personal computer and its data from unauthorized intrusion, monitors transmissions to and from computer and informs you of attempted intrusion
Audit Trail
It records access attempts
Access Control
It defines who can access computer & what actions they can take
Intrusion Detection Software
It analyzes network traffic, assesses system vulnerabilities, and identifies intrusions and suspicious behavior
User name
It is a unique combination of characters that identifies user
Password
It is private combination of characters associated with the user name that allows access to computer resources
Biometric Device
It authenticates person’s identity using personal characteristic
Hardware Theft
It is act of stealing computer equipment
Hardware Vandalism
It is act of defacing or destroying computer equipment
Software Theft
It is act of stealing or illegally copying software or intentionally erasing programs
License Agreement
It gives right to use software, and a single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
Product Activation
It allows user to input product identification number online or by phone and receive unique installation identification number
Business Software Alliance (BSA)
It promotes better understanding of software piracy problems
Encryption
A safeguard against information theft and process of converting plaintext (readable data) into ciphertext (unreadable characters)
Secure Site
It is Web site that uses encryption to secure
Digital Certificate
It is notice that guarantees Web site is legitimate
Certificate Authority
Authorized person or company that issues and verifies digital certificates
Secure Sockets Layer (SSL)
Provides encryption of all data that passes between client and Internet server
Noise
A unwanted electrical signal
Undervoltage
It drops in electrical supply
Overvoltage/Power Surge
A significant increase in electrical power
Surge Protector
It protects computer and equipment from electrical power disturbance
System Failure
Prolonged malfunction of computer
Uninterruptible Power Supply (UPS)
It is a surge protector that provides power during power loss
Backup
Duplicate of file, program, or disk
Full Backup
All files in computer
Selective Backup
It selects which files to back up