IT 105 Final Exam GMU

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

two or more computers that are linked together.

A basic computer network can be described as

2
New cards

LAN

local area network

3
New cards

distance

The primary difference between a LAN and a WAN

4
New cards

Connection point

Each individual computer and component attached to a network is a

5
New cards

cables

In a traditional LAN, each node of the network is connected through:

6
New cards

MAN

metropolitan area network

7
New cards

router

The hardware device or software program that sends messages between networks is known as a:

8
New cards

NIC

network interface card

9
New cards

bits per second

Modem speed is measured in:

10
New cards

Bandwidth

The term for the amount of information transmitted through a communication medium in a certain amount of time

11
New cards

fiber-optic cables

type of cables uses light waves to carry information at high speed

12
New cards

firewall

helps block unauthorized access and data transfer

13
New cards

Trojan horse

A program that performs a useful task while simultaneously allowing destructive acts is a

14
New cards

Virus

An intentionally disruptive program that spreads from program to program or from disk to disk is known as

15
New cards

Worm

A type of virus uses computer hosts to reproduce itself

16
New cards

a denial of service attack

When customers of a Web site are unable to access it due to a bombardment of fake traffic, is is known as

17
New cards

encryption

The scrambling of code is known as

18
New cards

True

Information security is the practice of defending information from unauthorized access.

19
New cards

True

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers

20
New cards

False

Hoax viruses flood a targeted computer with so many requests that it cripples functionality.

21
New cards

True

The most complex type of firewall is the application proxy firewall

22
New cards

True

A router is a hardware component used to interconnect networks

23
New cards

4

How many layers are there in the TCP/IP protocol suite?

24
New cards

128

IPv6 addresses are how many bits long?

25
New cards

False

UDP provides sequencing, error control and flow control just like TCP

26
New cards

CAT 2, CAT 3, and CAT 5

What are standard twisted pair cables?

27
New cards

Contextual Computing

Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user?

28
New cards

Workplace Hub

Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user's existing technologies (including hardware, software, and services) into a one stop connected platform?

29
New cards

Non-Immersive, Semi-immersive, and Fully-immersive

Simulation types for implementing of virtual reality technology?

30
New cards

CNN, DNN, and LSTM

Deep Learning Algorithms?

31
New cards

Big Data Analytics

the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions

32
New cards

172.16.64.0

subnet

33
New cards

Class A

terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7

34
New cards

False

Decryption is the process of converting plaintext into ciphertext

35
New cards

False

Serial transmission is described as transmitting a group of bits at a single instant in time, which requires multiple paths

36
New cards

True

Malware refers to any computer program designed to surreptitiously enter a digital device.

37
New cards

False

Private-key functions involve the use of two keys during the process of Private-key encryption.

38
New cards

transport

Which OSI layer offers reliable, connection-oriented data communication services?

39
New cards

164.20.31.9

Which of the following is an IPv4 address?

40
New cards

EULA (End User License Agreement)

Agreement between the user and the software publisher

41
New cards

hot-plugging

When a peripheral device is connected or disconnected while the host device is operating

42
New cards

IoT smart sensors

work behind the scenes to collect data and use it to improve just about anything

43
New cards

Anonymizing data

What happens to the data they collect, however, can pose security and privacy risks

44
New cards

the time it takes for one pixel to change from black to white than back to black. 5 ms or less

What is the response rate in the context of image quality in display devices?

45
New cards

Offline (CD), Online, .exe (Windows), .dmg and .app (Mac), CNET, Tucows, Developer Website

Software Distribution

46
New cards

One-time purchase

The software remains the same as when it was purchased

47
New cards

Subscription

consumers pay an annual fee to use software; updates and upgrades are usually included in the pricing

48
New cards

Trial

consumers use a software product during a free trial period

49
New cards

Freemium

provides free use of a stripped-down or basic version of the product but requires payment for upgraded features

50
New cards

license agreements

displayed during the installation process; by clicking the I agree button, you consent to the terms of the license agreement

51
New cards

Open source software

Makes uncompiled program instructions-the source code- available to programmers who want to modify and improve the software. (Linux, FileZilla) Includes source code

52
New cards

Telecommunication

is the distance transfer of meaningful information from a source location to a destination location. Does this through cable (copper or fiber)

53
New cards

telephony

refers to the transmission of sound over wire or wireless

54
New cards

LAN

less than 5km, private, college campuses, single apartments, business offices

55
New cards

MAN

5 to 50 km, private/public, City networks,

56
New cards

Ring Topology

each device is attached along the same signal path to two other devices and forms a path in the shape of a ring

57
New cards

Bus

All devices are directly attached to a line and all signal pass through each of the devices

58
New cards

Wide Area Network (WAN)

More than 50 km, private/public, connects offices in different cities using leased lines

59
New cards

Star

all computers are connected to a central node, called a hub, which rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on a network

60
New cards

Tree

resembles an interconnection of star networks

61
New cards

Mesh

more interconnections between nodes at different levels, or even at the same level

62
New cards

Hybrid

A combination of two or more basic network topologies

63
New cards

VPN

Virtual Private Network

64
New cards

Distributed Computing

spreads users across several smaller systems, and limits the disruption that will be causes if one of the systems goes down

65
New cards

Centralized computing

involves accessing a central computer, called the mainframe, which does all processing associated with most tasks

66
New cards

Application Layer

The seven layer of the OSI model. A user interacts with a network primarily through applications running on a computer

67
New cards

Presentation Layer

The sixth layer of the OSI model. Translates between the application and the network. It also manages data encryption and decryption, such as the scrambling of system passwords.

68
New cards

Session Layer

The fifth layer in the OSI model. This layer establishes, maintains, and terminates sessions between two computing devices that are exchanging information

69
New cards

Transport Layer

The fourth layer of the OSI model. In this layer protocols ensure that information has successfully moved between two points on a network

70
New cards

Network Layer

The third layer in the OSI model. Responsible for how packets should be routed and switched through a network

71
New cards

Data Link Layer

The second layer in the OSI model. This layer defines physical addressing

72
New cards

Physical Layer

The lowest, or first, layer of the OSI model. Protocols in this layer that define the electrical and mechanical specifications for the interface between a device and transmission medium, fiber-optic cable, coaxial cable, or twisted pair

73
New cards

IPv4 addressing

A string of 32 bits. Consists of 4 octets

74
New cards

Class B address

Class B addresses span from 128 to 191, with a default subnet mask of 255.255.0.0.

75
New cards

Class A address

0 to 127, with

a default subnet mask of 255.0.0.0.

76
New cards

Class C

192-223, with a default subnet mask of 255.255.255.0.

77
New cards

Multicasting

group communication

78
New cards

encryption

transforms a data file so that its contents are hidden from unauthorized readers

79
New cards

malware

refers to any computer program designed to surreptitiously enter a digital device

80
New cards

Trojan horse

disguise malware as legitimate software

81
New cards

botnets

client-server network hidden from the victims

82
New cards

spam

unsolicited messages that are usually sent in massive numbers using electronic mail systems

83
New cards

phishing

an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS

84
New cards

pharming

redirects web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams

85
New cards

private key

An asymmetric encryption key that does have to be protected

86
New cards

public key

An asymmetric encryption key that does not have to be protected.

87
New cards

Class D

Multicasting

88
New cards

Class E

experimental, used for research

89
New cards

Quality of Service

measurement of the overall performance of a network

90
New cards

Latency

the delay that an application can tolerate in delivering a packet of data

91
New cards

Virtual Reality (VR)

a computer technology that uses VR headsets, in combination with interactive hardware and software, to generate realistic images, sounds, and other sensations that simulate a user's physical presence in a virtual or imaginary environment

92
New cards

contextual computing

the use of software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user.

93
New cards

Deep learning algorithms

Convolutional Neural Network (CNN), Deep Neural Network (DNN), Long Short-Term Memory (LSTM)

94
New cards

Direct Memory Access (DMA)

most sophisticated and very efficient means of dealing with IO. Data is transferred between a peripheral device and memory without the active intervention of a processor

95
New cards

unicast

one to one

96
New cards

multicast

one to group

97
New cards

broadcast

one to all

98
New cards

password entropy

log base 2 10^4

99
New cards

payload

the action carried out by malware code

100
New cards

code injection

the process of modifying an executable file or data stream by adding additional commands