Fundamentals of Computer Systems Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Explain what VOIP is

Voice over IP. Making calls over the internet

2
New cards

What is digital footprint?

How you present yourself on the internet

3
New cards

What is netiquette?

Rules for acceptable behavior on the Internet

4
New cards

What is E-Commerce? What are the three types of E-commerce?

E-Commerce is doing business on the web. The three types are:

  • B2B: Business to Business

  • B2C: Business to Consumer

  • C2C: Consumer to Consumer

5
New cards

Define LAN

Local Area Network. Connected devices in the same area

6
New cards

Define WAN

Wide Area Network. Connects multiple LANS over dedicated lines using routers

7
New cards

What is topology? List the four types of topology

Topology is the map of the network. The four types are star, ring, bus, and mesh.

8
New cards

What is a VPN? Explain the process of using it

A virtual private network masks its IP address as something different from the actual address and uses encryption to ensure that data is secure.

9
New cards

What is the difference between a router and a switch?

The switch is inside the network. The router is outside the network.

10
New cards

Why is it important to protect your network?

To prevent hackers from stealing your personal information

11
New cards

Define “Cybercrime”

Cybercrime is the act of committing crimes online

12
New cards

What are the three types of cyber harassment

  • Cyberbullying: Between two minors

  • Cyber-harrassment: between adults

  • Cyberstalking: More serious, the stalker demonstrates a pattern of harassment and a credible threat of harm,

13
New cards

What is the difference between phishing and farming?

  • Phishing occurs in emails and IMs, and appears to be from someone with whom you do business. It is designed to trick you into providing usernames and passwords.

  • Farming hijacks a company’s domain name and redirects you to a phony website even if you type the URL.

14
New cards

Explain identity theft

Identity theft is the use of your name, Social Security number, or bank or credit cards for financial gain.

15
New cards

What are the three types of hacking?

  • White-hat: Attempting to find security holes in a system to prevent future hacking

  • Black-Hat: Malicious intent

  • Gray-Hat: Illegal but not malicious

16
New cards

Mention three types of malware and explain what they do

  • Spam: Sending mass unsolicited emails.

  • Cookies: Installed without permission to help websites identify you when you return. They may collect information that you don’t want to share.

  • Virus: A program that replicates itself and infects computers.

17
New cards

Describe three ways in which we can protect our computers against cybercrime

Firewall, Strong Password, & Antivirus Program

18
New cards

Discuss the encryption and decryption as it was described in class

Encryption converts plain text into ciphertext. Decryption converts ciphertext back into plain text.

19
New cards

What is a database and what is a table

A database is a collection of information organized in a useful way. A table is data arranged in rows and columns.

20
New cards

Define the words report, form, and query

  • Form: Used to input information or data

  • Query: Retrieves specific data from one or more tables

  • Report: Displays the data from a table or query

21
New cards

What are the three types of databases

  • Flat Databases: One Excel sheet, the simplest type.

  • Relational Databases: Most common type. Has multiple tables that are related by information

  • Object Oriented: Data is stored as objects, and is used for more complicated types of data

22
New cards

Explain the three relational databases

  • One to One: A Single record in one table links to a single record in another table

  • One to Many: A Single record in one table links to multiple records in another table.

  • Many to Many: Multiple records in one table can link to multiple records in another table