1/40
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network
A series of interconnected nodes (connection points) that are able to transmit, receive and exchange data. The data may have various formats including text, sound, images and video. Examples of nodes include computers, servers and routers.
Personal area network (PAN)
The smallest type of network, consisting of the connected devices that are in close proximity to an individual.
Local area network
(LAN)
A group of computers or devices that are connected on a single site.
Metropolitan area network (MAN)
A network that covers a larger geographical area, such as a city.
Wide area network
(WAN)
A national or international network;
the largest example is the internet.
Wireless networks
Use of wireless technologies to connect the different nodes to form a network.
Cloud network
Incorporate some or all of the network capabilities on a public or private cloud platform.
Peer-to-peer network (P2P)
A decentralized network in which each computer is equally responsible for storing and sharing data.
Network interface card
Device responsible for converting data into a digital signal and communicating this data to a network.
MAC address
A unique identifier assigned to every piece of hardware.
Router
A networking technology that transfers data from one network to another by the most efficient route available.
Modem
A device that converts digital data into analogue data so that it can be transmitted over a telephone line.
Wireless access point (WAP)
A device that creates a wireless local area network to improve coverage throughout a building.
Hub
A networking device that broadcasts data to all devices on the network.
Switch
A networking device that forwards data packets more efficiently than a hub.
Interoperability
Allows different digital technologies or systems to connect and exchange data with one another without restrictions.
Network protocol
A set of agreed rules that state how to format, send and receive data.
Transmission control protocol/internet protocol (TCP/IP)
Protocol that defines where data is to be sent to and from and how the data is to be broken down into packets before sending .
IP (internet protocol) address
A logical numeric address that is assigned to every node on a network.
Domain name server (DNS)
A server that translates domain names into IP addresses.
Bandwidth
The maximum rate of data transfer at any one time, measured in hertz (H2).
Speed
The length of time it takes for data to be transferred, measured in megabits per second (Mbps).
Data compression
Is a process that reduces the size of a file by re-encoding it to use fewer bits of storage than the original file.
Net neutrality
The concept that all data requests on the internet should be treated equally by the internet service providers (ISPs).
Multi-factor authentication
The use of multiple methods of authentication to verify a user's identity.
Firewall
Hardware or software designed to block unauthorized access to a network by inspecting incoming and outgoing network traffic.
Proxy server
Computer system that acts as an intermediary between the client on the network and the internet; providing an additional layer of security.
Mobile service provider (MSP)
A company that offers cellular connection to mobile phone subscribers.
VolP (voice over internet protocol)
Allows users to make voice calls using a broadband Internet connection instead of an analogue phone line.
Internet service provider (ISP)
A company that provides internet access and other related services to its customers.
Internet
The global collection of networks and networking technologies that link billions of users worldwide.
World Wide Web (WWW)
The websites and web services that are hosted on web servers and identified by their
URL (uniform resource locator).
Internet of things (loT)
Internet-connected devices that collect and share data.
Spamming
Sending unsolicited emails, mainly for the purpose of advertising.
Hacking
Unauthorized access to a computer or network.
Social engineering
In internet security, this means to manipulate a user into sharing confidential or personal information with a fraudster.
Phishing
A type of social engineering that involves sending fraudulent emails designed to trick users into revealing sensitive information.
Virus
A type of malicious software
comprised of small pieces of code, often attached to legitimate programs or emails.
Ransomware
Malware that infects a computer and effectively locks the user out of their own device and demands a payment to unlock it.
Distributed denial of service (DDOS)
attacks
Overwhelming a site or service so that it is not available to its intended users.
Identity theft
When someone steals your personal information with the intention of committing fraud. They may use your information to apply for a credit card or gain access to medical services.