ITC midterms

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Computer Networking

Links computers for shared resources through the internet.

2
New cards

Network

Connect computers and other devices to allow for communication and data sharing.

3
New cards

Purposes of Networks

Communication, Collaboration, Access to Information, Economic Development, Social Development.

4
New cards

Personal Area Network (PAN)

The smallest type of network with a limited span interconnects compatible personal devices.

5
New cards

Local Area Network

Used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.

6
New cards

Campus Area Network

An enterprise network covering multiple buildings in a campus environment, including universities and large organizations.

7
New cards

Metropolitan Area Network

Covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly as a metropolitan area network.

8
New cards

Wide Area Network

A much larger network covering vast areas, such as cities, provinces, and countries.

9
New cards

Network Architecture

A diagram displaying the structure of network devices and services to serve the clients' connectivity needs.

10
New cards

Access Networks

In campuses and branches bring users and devices together, such as linking employees in a corporate building.

11
New cards

Networks for Data Centers

In a company link multiple servers with data and applications and make them easily accessible to users.

12
New cards

Wide-area Networks (WANs)

Connect users to programs and services, such as hospital employees connecting to health applications.

13
New cards

Open Systems Interconnection

Provides a structure for networking that secures compatibility in the network hardware and software and expedites the advancement of upcoming networking technologies.

14
New cards

Physical Layer

Handles signal and media.

15
New cards

Data Link Layer

Assigned for the flow of data.

16
New cards

Network Layer

Provides addressing and routing decisions.

17
New cards

Transport Layer

Manages end-to-end delivery to ensure error-free packets.

18
New cards

Session Layer

Establishes, manages, and terminates sessions.

19
New cards

Presentation Layer

Manages protocol conversion and data translation.

20
New cards

Application Layer

Provides support for applications.

21
New cards

Wired Network

Uses cabling and connectors to initiate network connections.

22
New cards

Advantages of Wired Network

Faster network data transfer speed, Inexpensive setup, Not susceptible to outside interference.

23
New cards

Disadvantages of Wired Network

Specialized tools for cable connections, Labor-intensive.

24
New cards

LAN Ethernet Cable

Connects devices within a local area network.

25
New cards

Hub

Interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.

26
New cards

Switch

Initiates a direct connection from the sender to the destination bypassing the data traffic to ensure data privacy.

27
New cards

Cable Modem

Uses a cable connection to create a broadband network connection from a home network to the internet service provider (ISP).

28
New cards

Servers

Provide resources, data, services, and programs to other computers or clients over a network.

29
New cards

Firewall

A security device that monitors and secures incoming and outgoing network traffic based on established security policies.

30
New cards

Wireless Network

Uses radio signals to initiate network connections.

31
New cards

Advantages of Wireless Network

User mobility, Simple installation.

32
New cards

Disadvantages of Wireless Network

Security issues, Slower data transfer.

33
New cards

Wireless Access Point

Connects wireless devices and provides a connection to wired LANs.

34
New cards

Wireless Router

Consists of a router, switch, and wireless access point that uses radio frequency to link networking devices.

35
New cards

Wi-Fi Modem

Combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.

36
New cards

Network Topologies

The physical and logical arrangement of nodes such as a switch or hub and connections in a network.

37
New cards

Point-To-Point

The simplest network topology where two devices, like a computer or router, are connected directly.

38
New cards

Token Ring

Its deterministic nature ensures access to message transmissions at regular or fixed time intervals for each connected station.

39
New cards

Bus

Occurs when computers share the media for data transmission using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.

40
New cards

Star

Most common networking topology in LANs today, where all the devices connect to a central switch or hub.

41
New cards

Mesh

It's when the networking devices are directly connected where several paths exist between the end devices.

42
New cards

Fully meshed topology

If a direct path exists from each end device to other end devices in the network.

43
New cards

Partially meshed topology

If multiple paths are observed between the end devices.

44
New cards

Internet Privacy

Deals with the fundamental human rights of a person's privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

45
New cards

Techniques to Protect Internet Privacy

Without internet privacy, interested third-party companies will collect and analyze every online activity to take advantage of these data.

46
New cards

Securing a Web Browser

Web browsers such as Google Chrome and Mozilla Firefox are the most used browsers online for their specific features and familiarity, although a total security guarantee is not automatic.

47
New cards

Using a Virtual Private Network (VPN)

Best way to have Internet privacy.

48
New cards

Double-checking Unfamiliar Links

Never trust links from suspicious emails, sketchy websites, and advertisements.

49
New cards

Limited Sharing on Social Media

Social media platforms like Instagram, Facebook, and Twitter are all publicly accessible.

50
New cards

Using Multi-factor Authentication

It's an added verification step besides a conventional password.

51
New cards

Network Security

Ensures the integrity, confidentiality, and accessibility of computer networks.

52
New cards

Intrusion Detection System (IDS)

A software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

53
New cards

Wi-Fi Protected Access 3 (WPA3)

The latest wireless network security certificate protocol by the WiFi alliance.

54
New cards

Virtual Private Network (VPN)

Connects any remote device to an enterprise server wherein company data is hosted.

55
New cards

Email Security

The most effective security methods include email spam filters with deep learning to filter domains that send spam.

56
New cards

Revenue Loss

One of the most significant consequences companies face during an internet, and network downtime.

57
New cards

Maintenance Cost

Repairing damaged internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.

58
New cards

Lesser Productivity

Internet and network failure significantly affect productivity as tasks heavily rely on the internet.

59
New cards

Damaged Reputation

If internet and network failures regularly occur, it negatively impacts the employees and the company's clients and partners.

60
New cards

Legal Repercussions

Failures in operations and transactions mean failure to meet agreed upon outputs and deliverables on time.