Save files by altering the magnetic charges of the discs surface to represent 1s and 0s
2
New cards
What does the internal hard disk normally store
programs and data files
3
New cards
On a hard disk each track is divided into invisible wedge-shaped sections called
sectors
4
New cards
_____ are a popular solution for individuals and businesses where access speed is not essential, but capacity and durability are crucial
network drives
5
New cards
Examples of secondary storage
RAID, flash drives, external hard drives
6
New cards
How does an external hard drive connect to a computer
Connected to a USB/thunderbolt port on the system unit
7
New cards
Storage that retains its data after the power is turned off is referred to as a
Non-volatile storage
8
New cards
The process of accessing information from secondary storage devices is referred to as
reading
9
New cards
The _______ of a secondary storage device indicates how much data the storage medium can hold.
capacity
10
New cards
_____ measures the amount of time required by the storage device to retrieve data and programs
Access speed
11
New cards
What is file compression and what is it used for what is file decompression
Reduces file size, increases storage capacity, increases file transfer speed, reduce space required for storage. Expanding file size
12
New cards
This process improve system performance by acting as a temporary high speed holding area between a secondary storage device and the CPU
Disk caching
13
New cards
the characteristics of RAID storage
Larger versions of specialized devices that enhance organizational security by constantly making backup copies of files moving across the organizations networks
14
New cards
What are four ways to improve the performance of a hard disc
Disk cashing, raid/file compression/decompression
15
New cards
What are examples of solid state storage
Flash memory cards, USB drives, flash drives
16
New cards
What type of storage technology does a cell phone use
solid state storage
17
New cards
Optical disc use ____ to represent data
Pits and lands
18
New cards
Know about CD-RW, DVD - ROM drives, ultra HD Blu-ray and Blu-ray. What does the R in DVD - R stand for
DVD-ROM: Read only, used to distribute large databases and references CD-RW: Rewritable, used to create and edit multimedia presentations R: recordable
19
New cards
How are solid state storage devices and hard disks different?
solid state storage has no moving parts and is faster and more durable
20
New cards
What is it called when servers on the Internet supply applications as a service, rather than a product
cloud computing
21
New cards
_______ speed is the measure of the amount of time required by storage device to retrieve data and programs
access
22
New cards
What is disc caching?
•Uses hardware and software to anticipate data needs; performs function similar to RAM caching; improves processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU •Frequently used data is stored in memory
23
New cards
What is cloud storage?
The Internet provides a cloud of servers that supply of applications to clients as a service
24
New cards
What are hybrid drives
The merging of RAM, solid-state drives, and traditional hard drives to deliver better performance from storage arrays while keeping costs down
25
New cards
USB drives are also known as
flash drives
26
New cards
Three common storage options discussed in your text are hard disk, ______ and solid state storage
optical disc
27
New cards
Most large organizations store data throughout a strategy called an ________ to promote efficient and safe use of data across the networks within their organizations
Enterprise storage system
28
New cards
One of the most dramatic changes in connectivity and communications in the past few years has been
widespread use of mobile devices with wireless Internet connectivity
29
New cards
Which devices originate and accept messages in the form of data, information, and/or instructions
Sending and receiving devices
30
New cards
In a communication system, which device converts messages into packets that can travel across the communication channel
Which of the wireless connections is considered a line of sight medium
microwave
34
New cards
What does WiMAX stand for
Worldwide Interoperability for Microwave Access
35
New cards
Microwave communication uses high-frequency _______.
radio waves
36
New cards
A term relating to sending data to a satellite
Uplink
37
New cards
The GPS device in an automobile uses which communication channel
satellite
38
New cards
Cellular services use _____ to provide wireless connectivity to the Internet for smart phones
3g and 4g
39
New cards
The capacity of a communication channel is measured in
bandwidth
40
New cards
Types of bandwidth
voiceband, medium band, broadband, baseband
41
New cards
Every computer on the Internet has a unique numeric address called an
IP address
42
New cards
The process of breaking down information sent or transmitted across the Internet into small parts
Packetization
43
New cards
What is TCP/IP
Protocol software used to communicate with the Internet
44
New cards
Central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.
switch
45
New cards
In a computer network, this node that request and uses resources available from other nodes
client
46
New cards
This device enables connectivity between two LANS or a LAN and a larger net work
Network gateway
47
New cards
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or University
hotspot
48
New cards
A network topology in which the central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes
tree
49
New cards
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network
client/server
50
New cards
Organizations use the ____ to allow suppliers and others limited access to their networks
Extranets
51
New cards
All communications between a company's internal networks and the outside world pass through this server
Proxy
52
New cards
What is a VPN?
Virtual private network: creates a secure and private connection between a remote user and an organizations internal network, dedicated line between a users home/laptop computer and a company server
53
New cards
What is a mesh network?
Newest type, does not use specific physical layout, requires that each node has one or more connections to other nodes, if path disrupted data is rerouted
54
New cards
The actual connecting or transmission medium that carries the message in a communication system
Communication channel
55
New cards
A high frequency transmission medium that has a single solid copper core
Coaxial cable
56
New cards
Name of the process of converting from analog to digital
Demodulation
57
New cards
Uses standard telephone lines to provide high-speed connections
DSL
58
New cards
Transmits data as pulses of light through tiny tubes of glass
Fiber-optic cable
59
New cards
What is a local area network
A network that connects a group or organization in a small geographic region
60
New cards
What is a gateway network
a device that allows one LAN to be linked to other LANs or to larger networks
61
New cards
A LAN set up for household personal use is called
Home network
62
New cards
Country wide and worldwide networks
WAN
63
New cards
A ______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headset, controllers to game systems, and so on
Personal
64
New cards
What is a client/server network?
Central computers coordinate and supply services to other nodes on the network, a server provides access
65
New cards
What is an intranet
a private internet that is used exclusively within an organization
66
New cards
What is an extranet?
private network that connects more than one organization
67
New cards
What is a server?
a computer dedicated to providing one or more services to other computers or devices on a network
68
New cards
In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station.
base
69
New cards
describes how a network is arranged and how resources are coordinated and shared
network architecture
70
New cards
Most firewalls include a special computer called ______ a server to manage communications between the internal networks and the outside world
proxy
71
New cards
People that collect, analyze, and sell personal data
Information resellers
72
New cards
These programs record virtually everything you do on your computer and are used by employers to search employee mail and computer files
Employee monitoring software
73
New cards
What are cookies and what are they used for
Small pieces of tax sent to a browser by a website you visit
74
New cards
What types of cookies are there and what are they used for
Session: help websites recognize users and their information Persistent: remain in operation even after the web browser has closed Third party: aim of collecting information from web users to carry out research
75
New cards
Programs used to secretly record an individual's activities on the Internet
Spyware
76
New cards
Which type of program would likely be used by investigators to record a potential suspects Internet activities
keystroke logger
77
New cards
A cracker is what type of computer criminal
An individual who attempts to access computer systems without authorization
78
New cards
Most browsers offer this which ensures that your browsing activity is not recorded on your hard disk
Privacy mode
79
New cards
What is malware and what types of malware are there
Any program or file that is intentionally harmful to a computer, network or server. Ex: Computer viruses, worms, Trojan horses, ransomware and spyware
80
New cards
What type of program replicates itself and clogs computers and networks
Worm
81
New cards
Free computer games and free screen saver programs are typical carriers of _______.
Trojan horses
82
New cards
What is a denial of service attack
An action that prevents or impairs authorized use of networks, systems, or applications by exhausting resources like central processing unit, memory, bandwidth and disk space
83
New cards
What is a Internet scam
Dishonest scheme carried out over the Internet
84
New cards
What is cyber bullying
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
85
New cards
The most significant concerns for implementation of computer technology involve ______, security and ethics
privacy
86
New cards
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
Digital Millennium Copyright Act
87
New cards
Corporations often use this to prevent copyright violations.
Digital rights management (DRM)
88
New cards
This uses software to try thousands of common words sequentially in an attempt to gain and unauthorized access to a users account
Dictionary attack
89
New cards
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as user names and passwords
Rogue
90
New cards
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
Encryption
91
New cards
Acts as a security buffer between a corporations private networks and all external networks
Firewall
92
New cards
What is wireless network encryption and what is the most common type
Used to secure networks and protect the data of their clients. Ex: WEP, WPA, WPAZ
93
New cards
Measures to Protect Computer Security
Use a firewall, install antivirus software, anti-spyware
94
New cards
Concerned with protecting software and data from an authorized tampering or damage
Data security
95
New cards
This is a legal concepts that gives contact creators the right to control use and distribution of their work
Copyright laws
96
New cards
This law gives you the right to look at your personal records held by government agencies
Freedom of Information Act
97
New cards
Computer criminals that create and spread viruses are punished under this law.
Computer Fraud and Abuse Act
98
New cards
A privacy issue relates to the responsibility of controlling who is able to use data
Access
99
New cards
The collection of data that can be searched to find all the action of one person creates a ____ that reveals a highly detailed account of your life
Digital footprint
100
New cards
Stores information about the current session, your general preferences, and your activity on the website