1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Explain what VOIP is
Voice over IP. Making calls over the internet
What is digital footprint?
How you present yourself on the internet
What is netiquette?
Rules for acceptable behavior on the Internet
What is E-Commerce? What are the three types of E-commerce?
E-Commerce is doing business on the web. The three types are:
B2B: Business to Business
B2C: Business to Consumer
C2C: Consumer to Consumer
Define LAN
Local Area Network. Connected devices in the same area
Define WAN
Wide Area Network. Connects multiple LANS over dedicated lines using routers
What is topology? List the four types of topology
Topology is the map of the network. The four types are star, ring, bus, and mesh.
What is a VPN? Explain the process of using it
A virtual private network masks its IP address as something different from the actual address and uses encryption to ensure that data is secure.
What is the difference between a router and a switch?
The switch is inside the network. The router is outside the network.
Why is it important to protect your network?
To prevent hackers from stealing your personal information
Define “Cybercrime”
Cybercrime is the act of committing crimes online
What are the three types of cyber harassment
Cyberbullying: Between two minors
Cyber-harrassment: between adults
Cyberstalking: More serious, the stalker demonstrates a pattern of harassment and a credible threat of harm,
What is the difference between phishing and farming?
Phishing occurs in emails and IMs, and appears to be from someone with whom you do business. It is designed to trick you into providing usernames and passwords.
Farming hijacks a company’s domain name and redirects you to a phony website even if you type the URL.
Explain identity theft
Identity theft is the use of your name, Social Security number, or bank or credit cards for financial gain.
What are the three types of hacking?
White-hat: Attempting to find security holes in a system to prevent future hacking
Black-Hat: Malicious intent
Gray-Hat: Illegal but not malicious
Mention three types of malware and explain what they do
Spam: Sending mass unsolicited emails.
Cookies: Installed without permission to help websites identify you when you return. They may collect information that you don’t want to share.
Virus: A program that replicates itself and infects computers.
Describe three ways in which we can protect our computers against cybercrime
Firewall, Strong Password, & Antivirus Program
Discuss the encryption and decryption as it was described in class
Encryption converts plain text into ciphertext. Decryption converts ciphertext back into plain text.
What is a database and what is a table
A database is a collection of information organized in a useful way. A table is data arranged in rows and columns.
Define the words report, form, and query
Form: Used to input information or data
Query: Retrieves specific data from one or more tables
Report: Displays the data from a table or query
What are the three types of databases
Flat Databases: One Excel sheet, the simplest type.
Relational Databases: Most common type. Has multiple tables that are related by information
Object Oriented: Data is stored as objects, and is used for more complicated types of data
Explain the three relational databases
One to One: A Single record in one table links to a single record in another table
One to Many: A Single record in one table links to multiple records in another table.
Many to Many: Multiple records in one table can link to multiple records in another table