DSs

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Internetworking

Interconnected networks

2
New cards

The Internet

Network of networks

3
New cards

Advanced Research Project Agency (ARPANET) (1969)

The nuclear war myth that the internet was invented for nuclear war

4
New cards

TCP/IP

The two most important protocols in the protocol suite

5
New cards

IPv4 Addresses

Four fields separated by periods, each field ranging from 0–255

6
New cards

TCP

Controls the transmission of data

7
New cards

IP

Provides the address of the device for TCP to read and transmit it

8
New cards

Tim Berners-Lee

Invented the first browser (WorldWideWeb browser)

9
New cards

Mosaic (Marc Andreessen)

Created after the first browser

10
New cards

Browser

Allows users to navigate the web and access search engines and other resources

11
New cards

Hypertext Markup Language (HTML)

Standard markup language used to create and structure content on the World Wide Web

12
New cards

Hypertext Transfer Protocol (HTTP)

A protocol browsers implement to transfer messages from servers to computers

13
New cards

Uniform Resource Locator (URL)

Unique location

14
New cards

Domain Name Server (DNS)

Universal address translator so users don’t have to remember IP addresses

15
New cards

Search Engine

A large database

16
New cards

Cloud Workload Optimized

Get what you pay for/need

17
New cards

Cloud Computing

Computing services over networks

18
New cards

ASP to XaaS

ASP is a cloud computing service

19
New cards

Web Services and Service-Oriented Architecture (SOA)

Software objects that build scalable applications

20
New cards

Internet of Things (IoT)

Various devices beyond traditional computers connected to the internet

21
New cards

Cookies

Unexecutable text files deposited by servers to track users and maintain state

22
New cards

Spyware

Gathers user data through email, settings, and clickstreams and sends it to third parties with or without authorization

23
New cards

Phishing

Fraudulent messages designed to trick users into revealing sensitive information

24
New cards

Ransomware

Hijacks data or files for payment

25
New cards

Zero-Day Vulnerability

Newly discovered software weakness exploited before it is fixed

26
New cards

Multi-Factor Authentication

Uses knowledge (password, PIN), inherence (biometrics), and possession (fob, code, QR) factors

27
New cards

Public Key Infrastructure (PKI)

System for issuing public/private key pairs and digital certificates

28
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access

29
New cards

Symmetric vs Asymmetric Encryption

Symmetric uses the same key

30
New cards

Private vs Public Key

Public key is shared

31
New cards

Digital Signature

Data represented as bits and bytes encrypted with a private key

32
New cards

Blockchain

Distributed database that stores records in a way that is difficult to tamper with

33
New cards

Social Engineering

Manipulating users into revealing personal information by asking relevant questions