TAMU ISTM 210 Exam 2 (Prof. Phinney)

5.0(1)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/147

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

148 Terms

1
New cards

Network

Two or more computers connect together

2
New cards

communicate, share

The purpose of a computer network is to ________________________ and __________________________ resources.

3
New cards

Network Interface Controller Card

Plugged into the motherboard and allows a network cable to be plugged in

4
New cards

Client

Anything that makes up a network, usually computers, smartphones, peripheral devices connected to a central computer

5
New cards

server

The purpose of a ___________________ is to share data or hardware and software resources among clients.

6
New cards

Network Ready

Term used to describe a computer that already has an NIC card built in

7
New cards

Ethernet Cord

Most common NIC

8
New cards

Media Access Control address

The ethernet cord provides the computer with a unique 48-bit address called a ______________________________.

9
New cards

Protocol

A rule that governs computer or network usage

10
New cards

Twisted Wire

The most common form of ethernet cable wire

11
New cards

Network Hub

The central location of the computer network

12
New cards

Transmission Control Protocol/Internet Protocol

Protocol that guarantees the reliability of the computer file received by the network's end user; will not send unless all packets are available

13
New cards

User Datagram Protocol

Protocol used primarily for streaming videos

14
New cards

does not

UDP (does or does not) need all packets in order for the file to be viewed

15
New cards

Network Operating System

Software the controls an entire network

16
New cards

Cisco Systems, Inc.

A company that the book used as an example of an NOS provider

17
New cards

Network Administrator

Oversees the NOS and is responsible for authenticating all users of a network; also ensures the network is running smoothly and is secure

18
New cards

Network Topology

The mapping of a physical network and logical interconnections between nodes

19
New cards

Bus Topology

Topology in a line - called the "backbone" - with two endpoints; anyone on the network can receive data simultaneously

20
New cards

Backbone

Another name for the long line in a Bus Topology network

21
New cards

Star Topology

Topology with nodes that radiate around a central node in a spoke-like fashion

22
New cards

Star

(Bus, star, or ring) is the MOST common form of network topology

23
New cards

Ring

(Bus, star, or ring) is the LEAST common form of network topology

24
New cards

Ring Topology

All computers are connected to one another in a circle

25
New cards

Local Area Network (LAN)

Relatively small network (typically within a single building); serves smaller parts of large businesses

26
New cards

Campus Area Network (CAN)

Connects two or more LANs that are located on a campus or headquarters

27
New cards

Metropolitan Area network (MAN)

Network that encompasses large geographical areas; relies on phone companies to connect smaller networks together

28
New cards

Peer-to-Peer Networks (P2P)

Computers are connected directly to one another (rarely used in business)

29
New cards

Firewall

Program that ensures only authorized users can access a network's intranet; determines who can see what

30
New cards

strong business background

"It is important that network administrators have a _________________________________________________."

31
New cards

Bus Topography

What type of topography is Texas A&M's network?

32
New cards

Virtual Private Network (VPN)

Allows users from outside the network to bypass the firewall

33
New cards

encrypted

"When authenticated, the VPN provides a(n) ________________________ link to allow access inside the firewall from outside the network"

34
New cards

CONCATENATE

What is Professor Phinney's favorite Excel function?

35
New cards

ctrl+A

How to select an entire table of data in Excel

36
New cards

email

Confidential information should NEVER be sent via _______________________.

37
New cards

Thousands

What does the "M" in "CPM" stand for?

38
New cards

UDP

What type of protocol does YouTube.com use?

39
New cards

Sir Tim Berners-Lee

Who developed HTML?

40
New cards

HTML5

The current form of HTML

41
New cards

UCLA

Which university began the ARPANET project?

42
New cards

Center for European Nuclear Research (CERN)

Where did Sir Tim Berners-Lee develop HTML?

43
New cards

Client/Server

The Internet is a ____________________ Network model

44
New cards

Webmasters

People who produce websites

45
New cards

Content, Interactivity, Design

The three aspects of a good website

46
New cards

Interactivity

The user can easily use the website

47
New cards

design

The customer's first impression of a business is the ________________ of the website

48
New cards

Caching

The act of a browser storing copies of previously viewed pages

49
New cards

Cookies

Text files used for tracking and maintaining user information

50
New cards

GIF, JPEG

The two most common types of graphic files

51
New cards

JavaScript

Programming language that allows the browser to run certain applications

52
New cards

Internet Service Provider

A business that provides people a way to connect to the internet

53
New cards

Digital Subscriber Line

Technology used by ISPs for services like web hosting and domain names

54
New cards

Broadband Internet Access

High data transmission rate internet connection; faster than a dialup modem

55
New cards

Web Hosting

Companies that rent websites to business owners

56
New cards

Keyword Search Engines

Searches for websites based on keywords entered by the user

57
New cards

Directory Searches

Search engines that are organized into directories

58
New cards

Metasearch Engines

Similar to Keyword Search Engines, but eliminates duplicate results

59
New cards

E Commerce

The distribution, buying, selling, advertising, and marketing of goods via the World Wide Web

60
New cards

Virtual Storefronts

Websites such as Amazon that have no physical outlet stores

61
New cards

Business-to-Business

Form of E Commerce that usually involves companies buying supplies in bulk from other companies

62
New cards

Business-to-Consumer

Form of E Commerce that involves consumers buying directly from an online store

63
New cards

Consumer-to-Consumer

Form of E Commerce where consumers sell products to each other for a fee (i.e., eBay)

64
New cards

Market Research

Answering the questions who is your customer, what is your competition, what is your product; a key to successful E Commerce

65
New cards

IT Competency

Ensuring that your E Commerce website is easy to navigate and secure

66
New cards

Agility

The idea that it is far easier to reengineer a website than it is to update the look of a physical storefront

67
New cards

Browser Hijacking

When a browser's settings are changed by Malware

68
New cards

Malware

Software that damages a computer's system without the owner's knowledge

69
New cards

Jeff Bezos

Founder of Amazon.com

70
New cards

Larry Page and Sergey Brin

The founders of Google

71
New cards

Stanford University

The two founders of Google developed it while they were getting their Ph. D's at ____________________________________________.

72
New cards

Universal Resource Locator

What does URL stand for?

73
New cards

Virus

A malicious program that can copy itself and infect a computer

74
New cards

Worm

A program that spreads quickly but does not need to attach itself to an existing program; typically targets networks

75
New cards

Trojan Horse

Seemingly harmless program that unleashes an extremely powerful virus at a set time/date

76
New cards

Spyware

Installs itself without permission and steals personal data (i.e., SSN, credit card numbers, passwords)

77
New cards

Adware

A program that routinely displays an ad without consent; typically a pop-up

78
New cards

Communication

The most common use of the Internet

79
New cards

Carbon Copy (CC)

Copies more than one recipient of an email

80
New cards

Blind Carbon Copy (BCC)

Copies more than one recipient of an email, but no one can see who the other recipients are

81
New cards

Terms of Service Agreement (TOS)

Outlines email usage and protocols

82
New cards

Phishing

Sending an email that looks like it's from a legitimate bank, but is really a way to steal a user's SSN, bank number, and password

83
New cards

Spam

Any unwanted mail; slows down computer systems

84
New cards

TRUE (it usually confirms to the sender that it found a legitimate email address)

Removing spam links does not stop the spam

85
New cards

Jerry Yang, David Filo

Founders of Yahoo.com

86
New cards

1994

Year Yahoo.com was founded

87
New cards

1995

Year Yahoo.com was incorporated

88
New cards

Voice Over Internet Protocol (VoIP)

Routing of voice conversations over the Internet (i.e., Skype, Vonage, CISCO); usually free

89
New cards

Intranet

Private version of the Internet, confined to an organization

90
New cards

Internet of Things (IoT)

Network of physical objects - devices, vehicles, buildings, etc. - embedded with electronics that enables them to collect and exchange data

91
New cards

privacy

The rise of IoT devices and Internet-enabled sensors in objects is creating _______________ concerns.

92
New cards

Bricking

The act of sending system updates that disable IoT devices

93
New cards

Resilience

Knowing you can't stop bad things from happening, but making sure you mitigate the damage and survive

94
New cards

Sam White, FIBERTOWN

Name of the speaker and the company he/she works for

95
New cards

Search Engine Optimization (SEO)

The process of affecting the visibility of a website in a search engine's "natural" or un-paid search results

96
New cards

Web Development Platforms (WDP)

Websites that allow people with little or no web experience or special software (i.e., Web.com, Wix.com)

97
New cards

Jacksonville, Florida

Location of Web.com's headquarters

98
New cards

Hypertext Markup Language (HTML)

Form of code developed in 1990 specifically for creating websites

99
New cards

Platform-Neutral

Program that can be read and rendered correctly by any browser software

100
New cards

FALSE (websites visit you)

(T/F) You can visit websites