BJC Unit 4 Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

What is the purpose of protocol?

Standards that ensure that all of the different kinds of devices using the internet can interact with each other smoothly.

2
New cards

Application Layer Protocols have the highest level of abstraction. What do they do?

Application Layer Protocols define the language the message a computer is sending.

3
New cards

Transport Layer Protocols manage what?

They manage the breakdown of a message into packets to be transmitted by lower-level protocols and the reconstruction of the message from the packets upon arrival.

4
New cards

What do Internet Layer Protocols manage?

They manage the pathways that the data packets travel across network. They treat the internet like one large network.

5
New cards

Network Interface Hardware or “Link Layer” does what?

This protocol manages the physical interface connection to the local network for any given device.

6
New cards

HTTP

  1. Hyper Text Transfer Protocol

  2. It interprets HTML code instructions for page formatting.

7
New cards

DNS

  1. Domain Name System

  2. It converts user-friendly web addresses into IP addresses

8
New cards

TCP

  1. Transmission Control Protocol

  2. It simulates a reliable, long-term connection between two computers by only displaying data once all packets have arrived.

9
New cards

IP

  1. Internet Protocol

  2. The addressing protocol that manages routing of data between computers.

10
New cards

SMTP

  1. Simple Mail Transfer Protocol

  2. An email protocol that sends mail.

11
New cards

SSL/TLS

  1. Secure Sockets Layer / Transport Layer Security

  2. Protocol that allows for data to be encrypted to make it private and secure.

12
New cards

Give two examples of Link Layer Protocols

  1. WiFI radio antenna

  2. Ethernet Cable

13
New cards

What is an “open protocol”?

Open protocols are available for anyone to see, use and code with.

14
New cards

What is a “closed protocol”?

Closed protocols are industry secrets.

15
New cards

Who is the IETF?

The Internet Engineering Task Force. They develop and approve protocols.

16
New cards

What country dominates the decisions about internet protocols?

USA

17
New cards

Which technology is especially vulnerable to software bugs that make it possible for cyber criminals to hack them?

Smart Phones

18
New cards

What do Certificate Authorities issue?

The issues public keys use for encryption/decryption.

19
New cards

How do open standards help security?

They allow the good guys - mathematicians - to study cryptography so the bad guys can’t exploit secret ideas.

20
New cards

What is the difference between a kilobit, a petabit, a gigabit and a megabit? Order them from biggest to smallest.

Peta 1,000,000,000,000,000

Giga 1,000,000,000

Mega 1,000,000

Kilo 1,000

21
New cards

What is the best way to measure latency?

ms (milliseconds)

22
New cards

What is the best way to measure bandwidth?

Bits per second (kilo, giga, mega)

23
New cards

Internet

A computer network that uses open protocols to standardize communication.

24
New cards

Computer Network

An interconnected computing system that is capable of sending or receiving data

25
New cards

Computer System

A group of computing devices and programs working together for a common purpose

26
New cards

Computing Device

A physical object that can run a program

27
New cards

World Wide Web

A system of linked pages, programs, and files that uses the Internet

28
New cards

Router

A computer that passes information from one network to another

29
New cards

ISPs (Internet Service Providers)

The companies who sell Internet access to homes and institutions

30
New cards

Bandwidth

The maximum amount of data that can be sent in a fixed amount of time

31
New cards

Storing data on the cloud

Storing data somewhere on the Internet

32
New cards

Path

A sequence of directly connected computing devices that connect a sender to a receiver

33
New cards

Routing

The process of finding a path from sender to receiver

34
New cards

Scalability

The ability of the Internet to keep working as it grows

35
New cards

Redundancy

The inclusion of back-up elements in case one part fails

36
New cards

Fault Tolerance

The ability of a system to work around problems

37
New cards

A Protocol

A set of rules that specify the behavior of a system

38
New cards

IP Address

A unique number assigned to each device on a computer network

39
New cards

A Packet

A small chunk of any kind of data and metadata that is passed through the Internet as a data stream

40
New cards

Packet Switching

The Internet sends short bursts of information, not long continuous strings

41
New cards

IP (Internet Protocol)

Lets your computer pretend it has a direct connection to another computer

42
New cards

TCP (Transmission Control Protocol)

Lets your computer pretend it has a reliable connection to the other computer

43
New cards

Encryption

The process of encoding data to prevent unauthorized access

44
New cards

Decryption

the process of decoding the data

45
New cards

Symmetric Encryption

using the same key for both encryption and decryption

46
New cards

Public Key Encryption

using a pair of keys: a public key for encryption and a private key for decryption

47
New cards

SSL/TLS (secure sockets layer/transport layer security)

the standard used for cryptographically secured information transfer on the Internet

48
New cards

Certificate Authorities

organizations that issue digital certificates to verify who owns the encryption keys used for secured communications

49
New cards

Malware

Software that was designed to harm or take partial control over your computer

50
New cards

Keylogging Software

A kind of malware that records every key pressed by a user

51
New cards

Computer Virus

A type of malware that spreads and infects other computers

52
New cards

Antivirus/Anti-malware Software

Software designed to scan your files and Internet transmissions looking for malware

53
New cards

Firewall

A security system that controls the kinds of connections that can be made between a computer or network and the outside world

54
New cards

Phising

A common security attack in which the victim is tricked into giving up personal information or downloading malware

55
New cards

DDoS (Distributed Denial of Service) attack

Using a virus to flood a server with many requests from many computers at once so that users of that server are denied service.

56
New cards

Rogue Access Point

A wireless access point that gives access to a secure network without the authorization of the network administrator.

57
New cards

Digital Divide

Unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors

58
New cards

Citizen Science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

59
New cards

Crowdsourcing

The general term for using the Internet to get a lot of people to help solve a problem

60
New cards

Computing Innovation

A physical, non-physical, or conceptual software innovation that includes a program as an integral part of its function

61
New cards

Bit

A single unit of data that can only have one of two values

62
New cards

Byte

Eight Bits

63
New cards

Word

A sequence of however many bits the CPU processes at a time

64
New cards

Binary Sequence

A string of ones and zeros

65
New cards

Analog

Data that has values that change smoothly, unlike digital data which change in discrete intervals

66
New cards

Sampling

Measuring samples of an analog signal at regular intervals

67
New cards

Sampling Rate

The number of samples measured per second

68
New cards

Floating Point

Scientific notation using powers of two to represent very large or very small values

69
New cards

Width

The number of bits that a CPU processes at a time

70
New cards

Lossless Data Compression

Algorithms that are reversible

71
New cards

Lossy Data Compression

Algorithms that are not fully reversible