CSP EXAM 1

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/166

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

167 Terms

1
New cards

What is a Network?

Two or more devices connected to share resources.

2
New cards

List three advantages provided by networks.

Resource sharing, communication, centralized storage.

3
New cards

Compare Peer-to-Peer and Client-Server Networks.

Peer-to-Peer: All devices equal; share files directly. Client-Server: Central server provides services to clients.

4
New cards

A school with 20 stand-alone PCs wants to network them with a file server. Three benefits?

Easier file sharing, centralized backup/security, shared printers/resources.

5
New cards

LAN Configurations

Ring: Devices in a loop; failure stops network. Star: Devices connect to hub; hub is failure point. Mesh: Every device connected to others; fault-tolerant, costly. Bus: Single cable backbone; cheap but one break stops network.

6
New cards

Difference among LAN, MAN, WAN, PAN (smallest to largest)?

PAN < LAN < MAN < WAN

7
New cards

Describe packet switching.

Data divided into packets
H packets travel independently
H reassembled at destination.

8
New cards

List 4 essential pieces of information in a packet.

Source address, destination address, sequence number, error-checking info.

9
New cards

Necessary components of a wireless network.

Devices, access point/router, modem, ISP connection.

10
New cards

Difference between bandwidth and latency.

Bandwidth: Max data per second. Latency: Delay in data transmission.

11
New cards

Three types of Internet GateKeepers and what they control.

ISPs
access control. Search Engines
ranking information. Governments
policy and regulation.

12
New cards

ARPANET and its role.

Early network connecting universities; precursor to the Internet.

13
New cards

Two major ideas by Paul Baran.

Packet switching and distributed networks for fault tolerance.

14
New cards

Who designs protocols for interconnecting networks?

Internet Engineering Task Force (IETF).

15
New cards

Difference between UDP and TCP.

TCP: Reliable, connection-oriented. UDP: Faster, connectionless.

16
New cards

Main task of IETF.

Develops and maintains Internet standards and protocols.

17
New cards

Physical backbone of the Internet.

Fiber-optic cables and undersea cables.

18
New cards

Order of search engine usage (%): Bing, DuckDuckGo, Google.

Google > Bing > DuckDuckGo

19
New cards

“Gates that swing both ways” (Google as GateKeeper).

Controls access to information but also allows information to be published.

20
New cards

Web Crawler / Spider?

Program that scans web pages for indexing.

21
New cards

Difference between Internet and WWW.

Internet = network; WWW = content accessed via Internet.

22
New cards

PageRank meaning.

Google algorithm ranking pages by relevance and links.

23
New cards

SSL/TLS purpose.

Encrypts web traffic; ensures secure browsing.

24
New cards

TCP/IP analogy with US Postal System.

TCP = envelope & sequence. IP = address & routing.

25
New cards

Difference between HTTP and HTTPS.

HTTPS = secure version with SSL/TLS encryption.

26
New cards

Domain Name Hierarchy example.

Top-level
second-level
subdomain (.edu
rutgers
cs).

27
New cards

Purpose of DNS.

Converts domain names into IP addresses.

28
New cards

Internet Society purpose.

Oversees standards, promotes Internet development.

29
New cards

W3C purpose.

Develops web standards (HTML, CSS, XML).

30
New cards

Examples of browsers.

Chrome, Firefox, Safari.

31
New cards

Examples of search engines.

Google, Bing, DuckDuckGo.

32
New cards

Fault tolerance / Redundancy.

Internet can reroute traffic if paths fail.

33
New cards

Who owns the Internet?

No single owner; globally distributed.

34
New cards

Net Neutrality.

ISPs must treat data equally; status varies (2023).

35
New cards

Impact if Net Neutrality abolished.

ISPs could prioritize content; unfair access to services.

36
New cards

Caesar Cipher.

Shifts letters by a fixed number of positions.

37
New cards

Frequency Analysis.

Decodes messages by analyzing letter frequency.

38
New cards

Difference between Symmetric and Public Key Encryption.

Symmetric: One key. Public Key: Pair (public/private).

39
New cards

Digital Signature.

Confirms authenticity and integrity of messages.

40
New cards

Binary Representation.

Representation of data using 0s and 1s.

41
New cards

Lossy vs Lossless compression.

Lossy: Some data lost. Lossless: No data lost.

42
New cards

Example of Lossless compression.

Surgery image.

43
New cards

Example of Lossy compression.

Web image.

44
New cards

Difference between ROM and RAM.

ROM: Permanent. RAM: Temporary.

45
New cards

Effect of more RAM.

More RAM
faster performance.

46
New cards

KB and GB in bytes.

KB = 1024 bytes. GB = 1024 MB.

47
New cards

Tasks of an OS.

Manages hardware, software, resources. Examples: Windows, MacOS, Linux.

48
New cards

Advantages of multi-core processors.

Parallel processing
faster performance.

49
New cards

Difference between HDD and SSD.

SSD = faster, no moving parts. HDD = slower, mechanical.

50
New cards

Difference between Modem and Router.

Modem: Connects to ISP. Router: Connects multiple devices.

51
New cards

Connection order.

ISP
Modem
Router
Devices.

52
New cards

File deletion.

OS deletes pointer; secure deletion requires overwriting.

53
New cards

Risk and Opportunity of Encryption.

Risk = lost key = lost access; Opportunity = secure communication.

54
New cards

Risk and Opportunity of Storage Media.

Risk = data loss; Opportunity = easy backup.

55
New cards

Risk and Opportunity of Social Networking.

Risk = privacy loss; Opportunity = global connection.

56
New cards

Risk and Opportunity of Data Networks.

Risk = hacking; Opportunity = instant communication.

57
New cards

Purpose of Captcha/ReCAPTCHA.

Verify humans; train AI on text/image recognition.

58
New cards

Impact of Cloud Apps.

Examples: Google Drive, iCloud.

59
New cards

Environmental impact of tech production.

E-waste, energy consumption.

60
New cards

Dangers of Deep Fakes.

Misinformation, identity theft, political manipulation.

61
New cards

Uses of Drones.

Delivery, inspection, military surveillance.

62
New cards

Open-Source vs Crowdsourcing/Crowdfunding.

Open Source Software: Publicly available code. Crowdsourcing: Collective input. Crowdfunding: Collective funding.

63
New cards

Example of Algorithmic Bias.

Loan denial based on race/gender.

64
New cards

Minimizing bias.

Use diverse datasets, audits, transparency.

65
New cards

Solutions to Digital Divide.

Affordable Internet, digital literacy programs.

66
New cards

7 Koans of Bits.

It
all just bits. Perfection is normal. Want amid plenty. Processing is power. More of the same can be a whole new thing. Nothing goes away. Bits move faster than thoughts.

67
New cards

LAN (Local Area Network)

Small network within limited area.

68
New cards

WAN (Wide Area Network)

Large-scale network across regions.

69
New cards

MAN (Metropolitan Area Network)

Network within a city or metro area.

70
New cards

PAN (Personal Area Network)

Small network around a person.

71
New cards

Packet Switching

Breaking data into packets for transmission.

72
New cards

Protocol

Rules governing communication between devices.

73
New cards

TCP

Reliable, connection-oriented protocol.

74
New cards

UDP

Faster, connectionless protocol.

75
New cards

IP (Internet Protocol)

Handles addressing and routing.

76
New cards

DNS (Domain Name System)

Converts domain names into IP addresses.

77
New cards

HTTP

Transfers web pages.

78
New cards

HTTPS

Secure HTTP with SSL/TLS encryption.

79
New cards

SSL/TLS

Protocols for encryption and secure communication.

80
New cards

IETF

Develops Internet standards.

81
New cards

W3C

Develops web standards.

82
New cards

ARPANET

First packet-switched network, precursor to Internet.

83
New cards

Router

Device that forwards packets between networks.

84
New cards

Modem

Connects to ISP for Internet access.

85
New cards

Firewall

Controls network traffic for security.

86
New cards

ISP

Provides Internet connection.

87
New cards

Search Engine

Indexes and retrieves information (Google, Bing).

88
New cards

Web Browser

Software to access web pages (Chrome, Safari).

89
New cards

PageRank

Google algorithm ranking web pages.

90
New cards

Web Crawler

Program that indexes websites.

91
New cards

Bandwidth

Maximum data transfer rate.

92
New cards

Latency

Delay in data transmission.

93
New cards

Fault Tolerance

System
ability to continue after failures.

94
New cards

Redundancy

Extra resources for backup/fault tolerance.

95
New cards

Net Neutrality

Equal treatment of Internet traffic.

96
New cards

Encryption

Securing data by encoding it.

97
New cards

Symmetric Encryption

One key used for both encryption/decryption.

98
New cards

Public Key Encryption

Uses public and private key pair.

99
New cards

Digital Signature

Confirms authenticity and integrity of data.

100
New cards

Caesar Cipher

Simple substitution cipher shifting letters.