IT Fundamentals: Big Buffies

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

The World Wide Web

An information system that enables content sharing over the Internet through user-friendly ways, it allows documents and other web resources to be accessed over the Internet according to specific rules of the Hypertext Transfer Protocol (HTTP)

2
New cards

PHP Processor

The software component responsible for executing PHP scripts on a web server (PHP: collects form data, generates dynamic page content, or sends and receives cookies)

3
New cards

Router

A network device that directs data between different networks (The internet -> Huge network, home's private network), choosing the best path for each packet to travel; It connects to local devices to the Internet, assigns them IP addresses, and manages traffic so everything flows smoothly without collisions (essentially acting as a traffic controller for digital communication)

4
New cards

Packet

A small, structured chunk of data sent across a network.

  • Instead of sending an entire file or message as one big piece, computers break it into packets so they:

    • can travel efficiently

    • take different paths if needed

    • be reassembled at the destination.

5
New cards

Modem

The device that talks directly to your ISP (Internet Service Provider) and converts their signal (from either a coaxial or fiber-optic cable) into standard digital internet data

  • Converts ISP signals

  • Gives your router a single IP address

  • Acts as the gateway between the ISP and your home network

6
New cards

Cable Internet

Uses a coax cable (the same one used for a TV) that sends electrical signals through copper wiring

  • Fast, but slower than fiber at the high end

Extremely common because it piggybacks on the same coaxial cable systems used for TV

(Examples: Comcast Xfinity, Optimum)

7
New cards

Fiber Internet

Uses thin glass strands called fiber optic cables that send light pulses instead of electricity

  • Upload and download speeds are equal (called symmetrical speeds)

  • Doesn't slow down from electrical interference

  • Handles huge amounts of data without congestion

(Examples: Verizon Fios, Google Fiber, AT&T Fiber)

8
New cards

Network

Just two or more devices connected so they can send data to each other.

9
New cards

OSI Model

Otherwise known as the Open Systems Interconnection Model, this describes how data moves from one device to another over a network. It has seven layers, from the closest to the user (Layer 7) to the closest to the hardware (Layer 1).

10
New cards

Physical Layer

Layer 1 —> Transmits raw bits over physical media (the actual wires and signals carrying data)

  • Examples: Cables (Ethernet, fiber), Wi-Fi signals, Network interface cards

11
New cards
  1. Application

  2. Presentation

  3. Session

  4. Transport

  5. Network

  6. Data Link

  7. Physical

“All People Should Take Noble Data Processing”

12
New cards

Data Link Layer

Layer 2 → Handles node-to-node data transfer over a single physical network link and handles error detection/correction, using MAC addresses and frames; In other words, it makes sure data can move correctly between two directly connected devices (like your computer to your router)

How does the Data Link Layer do this?

  1. Breaks the raw bits from the Physical Layer into frames (structured chunks of data)

  2. Adds headers and trailers so the device knows when a frame starts and ends

  3. MAC addresses are used to identify source and destination devices

(Local street delivery between nearby houses)

Includes the Ethernet (for LAN), and Point-to-Point Protocol (for direct connections between two network nodes)

13
New cards

MAC Addresses

Media Access Control address that is assigned to a network interface controller (NIC); it is a 12-digit hexadecimal number that serves as the physical hardware address for devices on a network —> allowing them to communicate with one another on a local network segment

<p>Media Access Control address that is assigned to a network interface controller (NIC); it is a 12-digit hexadecimal number that serves as the physical hardware address for devices on a network —&gt; allowing them to communicate with one another on a local network segment</p>
14
New cards

Network

Layer 3 —> Determines how data gets from one network to another through routing and logical addressing

  • IP addresses, routers, ICMP

Determines the best physical path for data to reach its destination based on network conditions, the priority of service, and other factors

15
New cards

Headers and Trailers

Control data added to the beginning (header) and end (trailer) of a data block for management, routing, and error checking

16
New cards

Transport

Layer 4 —> Ensures complete data transfer, error recovery, and flow control between hosts. This layer segments and reassembles data for efficient transmission and provides reliability with an error detection and correction mechanism

17
New cards

Session

Layer 5 —> Manages and controls the connections between computers. It establishes, maintains, and terminates connections, ensuring that data exchanges occur efficiently and in an organized manner.

18
New cards

Presentation

Layer 6 —> Responsible for translating data between the application layer and the network format. Ensures data is in a usable format for the Application layer, focused on data translation, encryption and decryption, and both compression and decompression

19
New cards

Application

Layer 7 —> Serves as the interface between the end-user applications and the underlying network services, providing network services directly to end-user applications. (examples: web browsers, emails)

20
New cards

Network Protocol

Provides the rules by which the layers of a network communicate with each other.

  • This, in turn, provides rules by which different networks can communicate with each other.

  • This also informs network programmers and administrators how to implement, manage, and maintain a network.

21
New cards

TCP/IP

The most commonly used Internet protocol sets the requirements of all computers that communicate over the Internet. Thus, every computer may run other network protocols, but it is a requirement that they run TCP/IP (Transmission Control Protocol/Internet Protocol)

What are some rules of TCP/IP?

  • Each device on a TCP/IP network must be uniquely identifiable

  • Large data is split into small packets before transmission.

22
New cards

IPv4

Version of the Internet Protocol (IP), where their main job is to identify devices on a network and route data to the correct destination.; simple and remains widely used today

  • This version is the older and original IP addressing system, introduced in the early 1980s, where the address format is written as four numbers separated by dots.

  • About how many unique addresses? 4.3 billion

23
New cards

Checksum

A simple piece of data that, with high probability, tells you whether a message was received correctly; they are often used to verify data integrity but are not relied upon to verify data authenticity

24
New cards

Ping Program

A network diagnostic program that is used to determine whether another computer, or device, is available and reachable over a network.

  • Sends a small message called an ICMP Echo Request to a target device

  • Waits for an ICMP Echo Reply

25
New cards

Modulo

26
New cards

OLAP Model

Stands for Online Analytical Processing, a category of software tools used to analyze large volumes of data from multiple perspectives.

27
New cards

Slicing

Part of OLAP operations, involves creating a subset of the data by reducing the data from multiple dimensions to one dimension.

<p>Part of OLAP operations, <span><span>involves creating a subset of the data </span><strong><span>by reducing the data from multiple dimensions to one dimension.</span></strong></span></p>
28
New cards

Dicing

Part of OLAP operations; Same as slicing except that the result can be in multiple dimensions, but still obtaining a subset of the data.

<p>Part of OLAP operations; S<span>ame as slicing except that the result can be in multiple dimensions, but still obtaining a subset of the data.</span></p>
29
New cards

Drilling Up / Down

Part of OLAP operations; exclusively only shifts the view of the data

  • ______ Down: Provides more detail

  • _______ Up: Provides summarized data

  • Rolling Up: Provides summarized data but also collapses the data from multiple items into a single value

<p>Part of OLAP operations; exclusively only shifts the view of the data</p><ul><li><p>______ Down: Provides more detail</p></li><li><p>_______ Up: Provides summarized data</p></li><li><p>Rolling Up: Provides summarized data but also <span><span>collapses the data from multiple items into a single value</span></span></p></li></ul><p></p>
30
New cards

RAID

Redundant Array of Independent (or Inexpensive) Disks; a data storage technology that combines multiple physical hard drives into one logical unit to improve performance, fault tolerance, or both.

31
New cards

Pivoting

Part of OLAP operations, lets you swap rows and columns (or dimensions) to analyze the same data in a new way.

Example: Rows = Years, Columns = Regions --> Rows = Regions, Columns = Years

32
New cards

Domain Name System

Translates human-friendly website names into IP addresses that computers use to find each other on a network.

33
New cards

Network Port

A logical communication endpoint identified by a number (0-65535) that tells a computer which application or service should receive incoming network data

They work with the IP address, the IP address identifies the device, and the port number identifies the application on that device

34
New cards

Three-Way Network Handshake

A core process that TCP/IP uses to establish a reliable connection between two devices before any data is sent, where it 1)

35
New cards

Radio signals are transmitted through radio towers, cell phone towers, and microwave towers.

For long distances, cable is too expensive, and so radio signals are sent via…

36
New cards

Packet-Switching

The message’s pathway is created only as it is sent, most computer networks are ____-switched (the Internet)

37
New cards

Network Hub

Merely a device that connects multiple computers together.

  • When there are multiple computers connected to a ____, a message received by the ___ is made available to all connected computers!

<p><span><span>Merely a device that connects multiple computers together.</span></span></p><ul><li><p>When there are multiple computers connected to a ____, a message received by the ___ is made available to all connected computers!</p></li></ul><p></p>
38
New cards

Router

A device that connects multiple networks, typically used in specific locations in a network so that messages can be routed to other networks.

  • Creates a local network (LAN) by directing data traffic

  • Has decision-making capabilities

    • If message traffic exceeds its capacity, the router may have to drop messages purposefully

<p>A device that connects multiple networks, typically used in specific locations in a network so that messages can be routed to other networks.</p><ul><li><p>Creates a local network (LAN) by directing data traffic</p></li><li><p><strong>Has decision-making capabilities</strong></p><ul><li><p><span><span>If message traffic exceeds its capacity, the router may have to drop messages purposefully</span></span></p></li></ul></li></ul><p></p>
39
New cards

Network Gateway

A router that connects networks of different types..

  • If two networks use different protocols, this tool is capable of handling the differences in the messages themselves because of different protocols

40
New cards

Ethernet

A standard technology for wired networking that connects devices in a Local Area Network (LAN) or larger networks

<p><span><span>A standard technology for wired networking that connects devices in a Local Area Network (LAN) or larger networks</span></span></p>
41
New cards

WPA2

Otherwise known as Wi-Fi Protected Access 2, it is a wireless security standard that is used to protect Wi-Fi networks by encrypting data sent between devices and the wireless access point.

42
New cards

Protocol Attack

A type of cyberattack that exploits weaknesses in the design or implementation of a communication protocol (the rules that govern how data is transmitted between devices), rather than attacking a specific application or user directly.

43
New cards

Relational Database

Collection of data, organized to support access that models some aspect of reality

Relation: A set of tuples that have the same attributes.

44
New cards