1/147
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network
Two or more computers connect together
communicate, share
The purpose of a computer network is to ________________________ and __________________________ resources.
Network Interface Controller Card
Plugged into the motherboard and allows a network cable to be plugged in
Client
Anything that makes up a network, usually computers, smartphones, peripheral devices connected to a central computer
server
The purpose of a ___________________ is to share data or hardware and software resources among clients.
Network Ready
Term used to describe a computer that already has an NIC card built in
Ethernet Cord
Most common NIC
Media Access Control address
The ethernet cord provides the computer with a unique 48-bit address called a ______________________________.
Protocol
A rule that governs computer or network usage
Twisted Wire
The most common form of ethernet cable wire
Network Hub
The central location of the computer network
Transmission Control Protocol/Internet Protocol
Protocol that guarantees the reliability of the computer file received by the network's end user; will not send unless all packets are available
User Datagram Protocol
Protocol used primarily for streaming videos
does not
UDP (does or does not) need all packets in order for the file to be viewed
Network Operating System
Software the controls an entire network
Cisco Systems, Inc.
A company that the book used as an example of an NOS provider
Network Administrator
Oversees the NOS and is responsible for authenticating all users of a network; also ensures the network is running smoothly and is secure
Network Topology
The mapping of a physical network and logical interconnections between nodes
Bus Topology
Topology in a line - called the "backbone" - with two endpoints; anyone on the network can receive data simultaneously
Backbone
Another name for the long line in a Bus Topology network
Star Topology
Topology with nodes that radiate around a central node in a spoke-like fashion
Star
(Bus, star, or ring) is the MOST common form of network topology
Ring
(Bus, star, or ring) is the LEAST common form of network topology
Ring Topology
All computers are connected to one another in a circle
Local Area Network (LAN)
Relatively small network (typically within a single building); serves smaller parts of large businesses
Campus Area Network (CAN)
Connects two or more LANs that are located on a campus or headquarters
Metropolitan Area network (MAN)
Network that encompasses large geographical areas; relies on phone companies to connect smaller networks together
Peer-to-Peer Networks (P2P)
Computers are connected directly to one another (rarely used in business)
Firewall
Program that ensures only authorized users can access a network's intranet; determines who can see what
strong business background
"It is important that network administrators have a _________________________________________________."
Bus Topography
What type of topography is Texas A&M's network?
Virtual Private Network (VPN)
Allows users from outside the network to bypass the firewall
encrypted
"When authenticated, the VPN provides a(n) ________________________ link to allow access inside the firewall from outside the network"
CONCATENATE
What is Professor Phinney's favorite Excel function?
ctrl+A
How to select an entire table of data in Excel
Confidential information should NEVER be sent via _______________________.
Thousands
What does the "M" in "CPM" stand for?
UDP
What type of protocol does YouTube.com use?
Sir Tim Berners-Lee
Who developed HTML?
HTML5
The current form of HTML
UCLA
Which university began the ARPANET project?
Center for European Nuclear Research (CERN)
Where did Sir Tim Berners-Lee develop HTML?
Client/Server
The Internet is a ____________________ Network model
Webmasters
People who produce websites
Content, Interactivity, Design
The three aspects of a good website
Interactivity
The user can easily use the website
design
The customer's first impression of a business is the ________________ of the website
Caching
The act of a browser storing copies of previously viewed pages
Cookies
Text files used for tracking and maintaining user information
GIF, JPEG
The two most common types of graphic files
JavaScript
Programming language that allows the browser to run certain applications
Internet Service Provider
A business that provides people a way to connect to the internet
Digital Subscriber Line
Technology used by ISPs for services like web hosting and domain names
Broadband Internet Access
High data transmission rate internet connection; faster than a dialup modem
Web Hosting
Companies that rent websites to business owners
Keyword Search Engines
Searches for websites based on keywords entered by the user
Directory Searches
Search engines that are organized into directories
Metasearch Engines
Similar to Keyword Search Engines, but eliminates duplicate results
E Commerce
The distribution, buying, selling, advertising, and marketing of goods via the World Wide Web
Virtual Storefronts
Websites such as Amazon that have no physical outlet stores
Business-to-Business
Form of E Commerce that usually involves companies buying supplies in bulk from other companies
Business-to-Consumer
Form of E Commerce that involves consumers buying directly from an online store
Consumer-to-Consumer
Form of E Commerce where consumers sell products to each other for a fee (i.e., eBay)
Market Research
Answering the questions who is your customer, what is your competition, what is your product; a key to successful E Commerce
IT Competency
Ensuring that your E Commerce website is easy to navigate and secure
Agility
The idea that it is far easier to reengineer a website than it is to update the look of a physical storefront
Browser Hijacking
When a browser's settings are changed by Malware
Malware
Software that damages a computer's system without the owner's knowledge
Jeff Bezos
Founder of Amazon.com
Larry Page and Sergey Brin
The founders of Google
Stanford University
The two founders of Google developed it while they were getting their Ph. D's at ____________________________________________.
Universal Resource Locator
What does URL stand for?
Virus
A malicious program that can copy itself and infect a computer
Worm
A program that spreads quickly but does not need to attach itself to an existing program; typically targets networks
Trojan Horse
Seemingly harmless program that unleashes an extremely powerful virus at a set time/date
Spyware
Installs itself without permission and steals personal data (i.e., SSN, credit card numbers, passwords)
Adware
A program that routinely displays an ad without consent; typically a pop-up
Communication
The most common use of the Internet
Carbon Copy (CC)
Copies more than one recipient of an email
Blind Carbon Copy (BCC)
Copies more than one recipient of an email, but no one can see who the other recipients are
Terms of Service Agreement (TOS)
Outlines email usage and protocols
Phishing
Sending an email that looks like it's from a legitimate bank, but is really a way to steal a user's SSN, bank number, and password
Spam
Any unwanted mail; slows down computer systems
TRUE (it usually confirms to the sender that it found a legitimate email address)
Removing spam links does not stop the spam
Jerry Yang, David Filo
Founders of Yahoo.com
1994
Year Yahoo.com was founded
1995
Year Yahoo.com was incorporated
Voice Over Internet Protocol (VoIP)
Routing of voice conversations over the Internet (i.e., Skype, Vonage, CISCO); usually free
Intranet
Private version of the Internet, confined to an organization
Internet of Things (IoT)
Network of physical objects - devices, vehicles, buildings, etc. - embedded with electronics that enables them to collect and exchange data
privacy
The rise of IoT devices and Internet-enabled sensors in objects is creating _______________ concerns.
Bricking
The act of sending system updates that disable IoT devices
Resilience
Knowing you can't stop bad things from happening, but making sure you mitigate the damage and survive
Sam White, FIBERTOWN
Name of the speaker and the company he/she works for
Search Engine Optimization (SEO)
The process of affecting the visibility of a website in a search engine's "natural" or un-paid search results
Web Development Platforms (WDP)
Websites that allow people with little or no web experience or special software (i.e., Web.com, Wix.com)
Jacksonville, Florida
Location of Web.com's headquarters
Hypertext Markup Language (HTML)
Form of code developed in 1990 specifically for creating websites
Platform-Neutral
Program that can be read and rendered correctly by any browser software
FALSE (websites visit you)
(T/F) You can visit websites