1/46
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network
A group of two or more computers that are linked together
World Wide Web
An Internet application that is based on the HTTP protocol
Client
A computer or software application that requests services from a server located on the internet
Server
A host that provides some kind of service
Computing system
A group of computing devices and programs working together for a common purpose.
Simple Mail Transfer Protocol (SMTP)/Post Office Protocol (POP)
A system of rules that govern the behavior of some system
Uniform Resource Identifier (URI)
This identifies a resource on the WWW
Digital divide
This is the gap between people who have and use internet services and those who do not.
Ethernet
A network that uses wires to connect computers.
Host
A computer that's connected directly to the Internet -- often a computer that provides certain services or resources.
Bandwidth
The rate at which data is downloaded or uploaded in a network
Latency
A measure of the time it takes for a piece of data to reach its destination
Modem
A device that connects a computer to an Internet Service Provider (ISP)
Local Area Network (LAN)
This connects computers within a school or home
Wide Area Network (WAN)
This connects devices over a broad geographic region
Hypertext Transfer Protocol (HTTP)
The set of rules that governs the WWW application
Hypertext Markup Language (HTML)
A language for formatting Web pages.
Router
A device that transmits data between two different networks
Routing
The process of finding a path from sender to receiver
Internet Service Provider
A company that provides customers with Internet access
WiFi
This uses radio waves to connect devices
Router
A device that transmits data between two different networks
IP address
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
Ping
A networking utility used by network administrators to test the reachability of a host on the Internet.
Traceroute
A networking utility used to trace the route and measure delays of packets moving through the Internet
Packet
A collection of data used by the TCP/IP protocol to transmit data across the Internet
Packet switching
The method by which information is transmitted through the Internet
Fault-tolerant
The capability of a system to continue operating properly in the event of the failure of one or more of its components.
Abstraction layer
What the internet is organized into that is controlled by various protocols
Scalability
The capacity for the system to change in size and scale to meet new demands.
Robustness
How well a design can withstand negative impacts.
Packet sniffing
The act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. This concept is to computer networks what wiretapping is to a telephone network
Fault tolerance
A process that enables an operating system to respond to a failure in hardware or software. The system's ability to continue operating despite failures or malfunctions
IPv4 (Internet protocol version 4)
A string of 32 bits that provides a computer's IP address and is used to route data through the internet.
Ipv6 (Internet protocol version 6)
A newer 128 bit IP address which allows for many more devices to be addressed
Domain name
A hierarchical name) that identifies a domain and an institution on the Internet
DNS
An Internet service that translates domain names into IP addresses.
Strong password
A password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
Multi-factor authentication (MFA)
Users are asked to present several separate pieces of evidence involving knowledge
Biometrics
Using unique physical characteristics such as fingerprints
Malware
Software intended to damage a computing system or to take partial control over its operation
Virus
A malicious program that can copy itself and gain access to a computer in an unauthorized way
Ransomware
Malware that encrypts and locks computer systems until a ransom is paid
Phishing
A technique that is used to trick a user into providing personal information usually through email.
Keylogger
A program to record every keystroke made by a computer user.
Rogue access point
A wireless access point that gives unauthorized access to secure networks
Firewalls
Barriers that protect a network from unauthorized access