1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
network topology
the arrangement of the various elements (computers, routers, switches, etc) of a network
LAN
A small local area network of computers and devices
service
a) a _____ can be a specific application or function such as email, chat, etc . b) a _____ can refer to a specific part of an application, such as transmitting the data of a web page
Short message service (SMS)
real-time chats between individuals and groups of people (text messages)
image-sharing
sharing images in real time (instagram, snapchat)
streaming media services
a one-way service that continuously sends data (netflix, hulu)
internet telephony
talk over the internet to any PC equipped to receive calls (Skype, Facetime)
email source
send electronic messages over the internet (Gmail, YahooMail)
forums
Visit an online area to read and post topics to interest; can be anonymous (Nextdoor)
internet relay chat
real-time communication in a shared interface (a chatroom in SecondLife)
mailing lists
a group of users that share common interests, often through email (LISTSERV)
file transfer protocol (FTP)
transfer data files (downloads and uploads)
vulnerability
in cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access
virus
software that is spread by people, specifically user actions, usually through emails, websites, and chats. A virus infects your computer, causing a wide variety of problems
worm
similar to a virus except that a worm does not need a human to spread, rather it can rpelicate on its own to infect other comuters
backdoor
malicious software that bypasses the normal, secure, or restricted access
spyware
software that secretly collects information about you. It usually resides on a website or in a service such as your email program
trojan horse
a malicious program disguised as legitimate software. Users intentionally install a Trojan horse, thinking they are installing valid software.
adware
advertising software that can automatically download files or link to websites. It is often unasked-for and can contain malware
pop-up
a new dialog box that appears on your screen, sometimes with you requesting it.
operating system (OS)
Software that supports a computer’s basic functioning. Every general purpose computer has an operating system.
updates
Enhancements, improvements, and problem fixes for software.
firewall
Software that can stop malware from entering a network, computer, or device.
server
A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases.
router
A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
protocol
An agreed-upon method for communication
port
A way for a computer to identify specific programs and manage their activity. In an IP addresses, the port appears after a colon at the end of the address such as :21, :80, and :443.
web server
A computer that delivers files forming web pages across a network to requesting clients.
HTTP
Hyper-text transfer protocol; the rules of communication that web sites use to exchange data.
encryption
A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.
log files
A file that contains an official record of activities that occur on a computer
antivirus
Software that runs on your computer, looking for many different types of malware from many different sources.
file
All data on a computer Data is stored in many different types of files
folder
A special kind of file that contains other files.
process
An application file that is currently executing (also called running) in the operating system.
database
A collection of files.
web page
An HTML file
zip file
A file that contains a collection of other files
encryption
A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.
wildcard
A special character that can represent one or more characters. The asterisk (*) wildcard can stand from many letters, numbers, or symbols
RAM
Random Access Memory, or RAM, stores data that is in use
environment variable
A value that can change depending on the environment in which a processes runs
process tree
A process tree is a representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
URL
The acronym for “Uniform Resource Locator”. The systematic way to find specific web addresses and web pages. A URL is composed of characters that contain information about where to locate a resource over the internet.
cookie
small text-based bits of information about your browser that a web saves
site certificate
A site certificate, also called a security certificate, is a small data file that is validated by a “certificate authority”. It allows an organization to have a secure website.