TAMU ISTM 210 Exam 2 (Prof. Phinney)

studied byStudied by 1 person
5.0(1)
Get a hint
Hint

Network

1 / 147

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

148 Terms

1

Network

Two or more computers connect together

New cards
2

communicate, share

The purpose of a computer network is to ________________________ and __________________________ resources.

New cards
3

Network Interface Controller Card

Plugged into the motherboard and allows a network cable to be plugged in

New cards
4

Client

Anything that makes up a network, usually computers, smartphones, peripheral devices connected to a central computer

New cards
5

server

The purpose of a ___________________ is to share data or hardware and software resources among clients.

New cards
6

Network Ready

Term used to describe a computer that already has an NIC card built in

New cards
7

Ethernet Cord

Most common NIC

New cards
8

Media Access Control address

The ethernet cord provides the computer with a unique 48-bit address called a ______________________________.

New cards
9

Protocol

A rule that governs computer or network usage

New cards
10

Twisted Wire

The most common form of ethernet cable wire

New cards
11

Network Hub

The central location of the computer network

New cards
12

Transmission Control Protocol/Internet Protocol

Protocol that guarantees the reliability of the computer file received by the network's end user; will not send unless all packets are available

New cards
13

User Datagram Protocol

Protocol used primarily for streaming videos

New cards
14

does not

UDP (does or does not) need all packets in order for the file to be viewed

New cards
15

Network Operating System

Software the controls an entire network

New cards
16

Cisco Systems, Inc.

A company that the book used as an example of an NOS provider

New cards
17

Network Administrator

Oversees the NOS and is responsible for authenticating all users of a network; also ensures the network is running smoothly and is secure

New cards
18

Network Topology

The mapping of a physical network and logical interconnections between nodes

New cards
19

Bus Topology

Topology in a line - called the "backbone" - with two endpoints; anyone on the network can receive data simultaneously

New cards
20

Backbone

Another name for the long line in a Bus Topology network

New cards
21

Star Topology

Topology with nodes that radiate around a central node in a spoke-like fashion

New cards
22

Star

(Bus, star, or ring) is the MOST common form of network topology

New cards
23

Ring

(Bus, star, or ring) is the LEAST common form of network topology

New cards
24

Ring Topology

All computers are connected to one another in a circle

New cards
25

Local Area Network (LAN)

Relatively small network (typically within a single building); serves smaller parts of large businesses

New cards
26

Campus Area Network (CAN)

Connects two or more LANs that are located on a campus or headquarters

New cards
27

Metropolitan Area network (MAN)

Network that encompasses large geographical areas; relies on phone companies to connect smaller networks together

New cards
28

Peer-to-Peer Networks (P2P)

Computers are connected directly to one another (rarely used in business)

New cards
29

Firewall

Program that ensures only authorized users can access a network's intranet; determines who can see what

New cards
30

strong business background

"It is important that network administrators have a _________________________________________________."

New cards
31

Bus Topography

What type of topography is Texas A&M's network?

New cards
32

Virtual Private Network (VPN)

Allows users from outside the network to bypass the firewall

New cards
33

encrypted

"When authenticated, the VPN provides a(n) ________________________ link to allow access inside the firewall from outside the network"

New cards
34

CONCATENATE

What is Professor Phinney's favorite Excel function?

New cards
35

ctrl+A

How to select an entire table of data in Excel

New cards
36

email

Confidential information should NEVER be sent via _______________________.

New cards
37

Thousands

What does the "M" in "CPM" stand for?

New cards
38

UDP

What type of protocol does YouTube.com use?

New cards
39

Sir Tim Berners-Lee

Who developed HTML?

New cards
40

HTML5

The current form of HTML

New cards
41

UCLA

Which university began the ARPANET project?

New cards
42

Center for European Nuclear Research (CERN)

Where did Sir Tim Berners-Lee develop HTML?

New cards
43

Client/Server

The Internet is a ____________________ Network model

New cards
44

Webmasters

People who produce websites

New cards
45

Content, Interactivity, Design

The three aspects of a good website

New cards
46

Interactivity

The user can easily use the website

New cards
47

design

The customer's first impression of a business is the ________________ of the website

New cards
48

Caching

The act of a browser storing copies of previously viewed pages

New cards
49

Cookies

Text files used for tracking and maintaining user information

New cards
50

GIF, JPEG

The two most common types of graphic files

New cards
51

JavaScript

Programming language that allows the browser to run certain applications

New cards
52

Internet Service Provider

A business that provides people a way to connect to the internet

New cards
53

Digital Subscriber Line

Technology used by ISPs for services like web hosting and domain names

New cards
54

Broadband Internet Access

High data transmission rate internet connection; faster than a dialup modem

New cards
55

Web Hosting

Companies that rent websites to business owners

New cards
56

Keyword Search Engines

Searches for websites based on keywords entered by the user

New cards
57

Directory Searches

Search engines that are organized into directories

New cards
58

Metasearch Engines

Similar to Keyword Search Engines, but eliminates duplicate results

New cards
59

E Commerce

The distribution, buying, selling, advertising, and marketing of goods via the World Wide Web

New cards
60

Virtual Storefronts

Websites such as Amazon that have no physical outlet stores

New cards
61

Business-to-Business

Form of E Commerce that usually involves companies buying supplies in bulk from other companies

New cards
62

Business-to-Consumer

Form of E Commerce that involves consumers buying directly from an online store

New cards
63

Consumer-to-Consumer

Form of E Commerce where consumers sell products to each other for a fee (i.e., eBay)

New cards
64

Market Research

Answering the questions who is your customer, what is your competition, what is your product; a key to successful E Commerce

New cards
65

IT Competency

Ensuring that your E Commerce website is easy to navigate and secure

New cards
66

Agility

The idea that it is far easier to reengineer a website than it is to update the look of a physical storefront

New cards
67

Browser Hijacking

When a browser's settings are changed by Malware

New cards
68

Malware

Software that damages a computer's system without the owner's knowledge

New cards
69

Jeff Bezos

Founder of Amazon.com

New cards
70

Larry Page and Sergey Brin

The founders of Google

New cards
71

Stanford University

The two founders of Google developed it while they were getting their Ph. D's at ____________________________________________.

New cards
72

Universal Resource Locator

What does URL stand for?

New cards
73

Virus

A malicious program that can copy itself and infect a computer

New cards
74

Worm

A program that spreads quickly but does not need to attach itself to an existing program; typically targets networks

New cards
75

Trojan Horse

Seemingly harmless program that unleashes an extremely powerful virus at a set time/date

New cards
76

Spyware

Installs itself without permission and steals personal data (i.e., SSN, credit card numbers, passwords)

New cards
77

Adware

A program that routinely displays an ad without consent; typically a pop-up

New cards
78

Communication

The most common use of the Internet

New cards
79

Carbon Copy (CC)

Copies more than one recipient of an email

New cards
80

Blind Carbon Copy (BCC)

Copies more than one recipient of an email, but no one can see who the other recipients are

New cards
81

Terms of Service Agreement (TOS)

Outlines email usage and protocols

New cards
82

Phishing

Sending an email that looks like it's from a legitimate bank, but is really a way to steal a user's SSN, bank number, and password

New cards
83

Spam

Any unwanted mail; slows down computer systems

New cards
84

TRUE (it usually confirms to the sender that it found a legitimate email address)

Removing spam links does not stop the spam

New cards
85

Jerry Yang, David Filo

Founders of Yahoo.com

New cards
86

1994

Year Yahoo.com was founded

New cards
87

1995

Year Yahoo.com was incorporated

New cards
88

Voice Over Internet Protocol (VoIP)

Routing of voice conversations over the Internet (i.e., Skype, Vonage, CISCO); usually free

New cards
89

Intranet

Private version of the Internet, confined to an organization

New cards
90

Internet of Things (IoT)

Network of physical objects - devices, vehicles, buildings, etc. - embedded with electronics that enables them to collect and exchange data

New cards
91

privacy

The rise of IoT devices and Internet-enabled sensors in objects is creating _______________ concerns.

New cards
92

Bricking

The act of sending system updates that disable IoT devices

New cards
93

Resilience

Knowing you can't stop bad things from happening, but making sure you mitigate the damage and survive

New cards
94

Sam White, FIBERTOWN

Name of the speaker and the company he/she works for

New cards
95

Search Engine Optimization (SEO)

The process of affecting the visibility of a website in a search engine's "natural" or un-paid search results

New cards
96

Web Development Platforms (WDP)

Websites that allow people with little or no web experience or special software (i.e., Web.com, Wix.com)

New cards
97

Jacksonville, Florida

Location of Web.com's headquarters

New cards
98

Hypertext Markup Language (HTML)

Form of code developed in 1990 specifically for creating websites

New cards
99

Platform-Neutral

Program that can be read and rendered correctly by any browser software

New cards
100

FALSE (websites visit you)

(T/F) You can visit websites

New cards

Explore top notes

note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 62 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 19811 people
Updated ... ago
4.6 Stars(97)

Explore top flashcards

flashcards Flashcard22 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard130 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard57 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard69 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard213 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)