1/42
Vocabulary flashcards for Intro to Comp Final Exam Study Guide.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Network
A system that connects multiple computing devices, enabling them to share resources, communicate, and access data.
Benefits of Networks
Resource sharing, enhanced communication, and security with firewalls.
Disadvantages of Networks
Vulnerability to security threats, complexity in development and dependency, and high costs.
PAN (Personal Area Network)
A small-scale network designed to interconnect devices within an individual's immediate vicinity, typically within a range of a few centimeters to a few meters. Examples include wireless networks such as bluetooth or wifi.
HAN (Home Area Network)
A localized network that connects various digital devices within a household, facilitating communication and data sharing among devices such as computers, smartphones, smart TVs, and printers.
LAN (Local Area Network)
A network that interconnects devices within a limited geographical area, such as a home, office, or campus, enabling devices to communicate and share resources.
MAN (Metropolitan Area Network)
A computer network that interconnects multiple Local Area Networks (LANs) within a specific geographic area, such as a city or a large campus, spanning distances from 5 to 50 kilometers.
WAN (Wide Area Network)
A telecommunications network that spans a large geographic area, connecting multiple Local Area Networks (LANs) or Metropolitan Area Networks (MANs), enabling communication and resource sharing over long distances.
Client-Server Network
A distributed computing model where client devices request services or resources from centralized servers. In this architecture, clients initiate communication by requesting data or services from the server. The server then processes these requests and provides the requested resources or services back to the client. This model is commonly used in various applications, including web services, file sharing, and database management.
Network Wired Transmission Media
Physical connections used to transmit data in a network, including cables like twisted pair (UTP and STP), coaxial, and fiber optic. These media provide a guided path for signals to travel between devices. Each type offers different characteristics in terms of bandwidth, signal attenuation, and resistance to interference. Considerations include cost, distance, and the environment in which the cable will be deployed.
UTP Cable (Unshielded Twisted Pair)
A type of copper cable commonly used for networking due to its cost-effectiveness and ease of installation. UTP consists of pairs of insulated wires twisted together to reduce electromagnetic interference (EMI) and crosstalk. It is available in various categories (e.g., Cat5e, Cat6, Cat6a), each supporting different bandwidths and data transfer rates. UTP cables are commonly used in Ethernet networks for connecting computers, routers, and switches, making them a versatile choice for many networking environments.
STP Cable (Shielded Twisted Pair)
A copper cable that incorporates a metallic shield around its twisted wire pairs to mitigate electromagnetic interference (EMI) and radio frequency interference (RFI). This design ensures more secure and consistent data transmission, particularly in settings prone to electrical noise. The use of STP cables is favored in scenarios where maintaining data security and integrity is crucial.
Coaxial Cable
A type of electrical cable used to transmit high-frequency signals with minimal interference. It features a central conductor made of solid copper or copper-plated steel, surrounded by an insulating layer of dielectric material, which is then encased in a conductive shield made of braided copper or aluminum foil. This shield minimizes electromagnetic interference and signal leakage. An outer protective jacket provides additional insulation and protection against physical damage. Coaxial cables are commonly used for television signals, internet connections, and other high-frequency applications, offering reliable performance over moderate distances.
Fiber Optic Cable
A high-performance transmission medium that uses light to carry data over long distances with exceptional speed and minimal loss. Fiber optic cables consist of thin strands of glass or plastic that transmit data as light pulses. They are immune to electromagnetic interference, provide high bandwidth, and support data transmission over long distances without significant signal degradation. Fiber optic cables are widely used in telecommunications, internet infrastructure, and high-speed data networks.
Modem (Modulator-Demodulator)
A device that enables digital devices to communicate over analog transmission lines by converting digital data into analog signals and vice versa.
Router
A networking device that forwards data packets between computer networks, directing them from one network to another based on their destination IP addresses.Routers can connect multiple networks, enabling devices to communicate and share resources, and often include additional functions like firewalls and network address translation (NAT).
Switch
A device that connects multiple devices within a Local Area Network (LAN), enabling them to communicate efficiently by forwarding data only to the intended device. Switches operate at the data link layer and can manage data traffic to optimize network performance, often incorporating features like VLAN support and port mirroring.
Non Auction/Non Delivery Fraud
Online scams where perpetrators offer goods or services for sale, accepting payment without any intention of fulfilling the order or delivering the promised items. These fraudulent activities often occur on online marketplaces, classified ad websites, or through fake online stores. The victims are deceived into paying for items they never receive, resulting in financial loss and potential identity theft if personal information is compromised during the transaction.
Advance Fee Fraud
A scam where fraudsters lure victims by promising a significant sum of money, inheritance, or valuable goods in exchange for an upfront payment. This payment is purportedly needed to cover various expenses such as taxes, legal fees, processing fees, or bribes. However, after the initial payment is made, the fraudsters either disappear or continue to request additional payments under different pretexts, ultimately leaving the victim with substantial financial losses and no promised returns.
Boot Sector Virus
A type of virus that infects the boot sector (the area of a hard drive or storage device that contains the code needed to start the operating system) of a storage device. When an infected device is used to boot a computer, the virus executes before the operating system loads, potentially spreading to other devices and causing system malfunctions. This type of virus can be challenging to remove because it operates
Logic Bomb Virus
A type of malware secretly inserted into a software system that remains inactive until specific conditions are met, such as a particular date, time, or user action. When triggered, it executes malicious actions like data corruption, system shutdown, or unauthorized access. Logic bombs are hard to detect due to their dormant nature and can cause significant damage. Mitigation involves rigorous code reviews, intrusion detection systems, and monitoring user behavior to identify and neutralize potential threats before they activate.
Time Bomb Virus
A form of malware programmed to execute malicious commands on a specific date or after a set period. Once activated, it can initiate harmful actions, like erasing files or corrupting data. Time bombs are often embedded within other software and remain dormant until their activation trigger is met.
Encryption Virus (Ransomware)
A type of malicious software (malware) that encrypts a victim's files or their entire computer system, rendering the data inaccessible. After encryption, the attacker demands a ransom payment, often in cryptocurrency, in exchange for the decryption key needed to restore access to the data. Failure to pay may result in permanent data loss or public exposure.
Polymorphic Virus
A sophisticated type of malware that alters its internal code and characteristics each time it infects a new system. This makes it extremely difficult for traditional antivirus software, which relies on recognizing known virus signatures, to detect and remove the virus. The virus essentially 'morphs' or changes its form to evade detection.
Macro Virus
A computer virus that is written in the macro language (a scripting language to automate tasks) of an application, primarily affecting programs like Microsoft Word or Excel. It activates when the infected document is opened, automatically executing a sequence of malicious commands embedded within the macros, potentially compromising the security and integrity of your system.
Grayware
Software that falls between benign applications and malicious programs, exhibiting undesirable behaviors such as displaying excessive ads or tracking user activity.
Social Engineering
The art of manipulating individuals into divulging confidential information or performing actions that compromise security. This involves exploiting human psychology rather than technical hacking, often through deception or trickery to gain access
System Development Life Cycle (SDLC)
A structured approach to software development, encompassing several phases to ensure the creation of high-quality systems, including planning, analysis, design, development, testing, implementation, and maintenance.
Program Development Life Cycle (PDLC)
A structured approach on the creation of individual programs or software applications, detailing the steps from conception to deployment. Phases: Problem Definition, Design, Coding, Testing, Implementation, and Maintenance
IP Address (Internet Protocol Address)
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication, serving to identify the host or network interface and providing the location addressing.
URL (Uniform Resource Locator)
The address used to access resources on the internet, specifying the protocol, domain, and path to a resource.
HTML (Hypertext Markup Language)
The standard language used to create and design web pages, structuring content on the web using a system of tags and attributes.
Dedicated Server
A physical server that is dedicated entirely to a single client, providing them with exclusive use of its resources. This setup offers significant control, allowing the client to customize the server's hardware, software, and security settings to meet their specific requirements. Unlike shared hosting, a dedicated server ensures that the client's applications and data are isolated from other users, enhancing performance, security, and reliability.
Authentication Server
A network service that validates the credentials of entities attempting to access a network, ensuring that only authorized entities can access network resources.It handles login requests and verifies user identities, often using methods like passwords, tokens, or biometric data.
File Server
A computer or device on a network that manages and stores files, allowing other devices to access and share them, centralizing the data storage and making file management more efficient.
Printer Server
A device or software that manages print requests from computers and sends them to the appropriate printer, allowing multiple users to share a single printer over a network.
Application Server
A software framework that provides an environment for running and managing applications, handling business logic, database connections, and application services, enabling efficient application deployment and management.
Email Server
A computer system that manages the sending, receiving, and storage of email messages, operating using standard email protocols such as SMTP, IMAP, or POP3.
Communications Server
A computer system that facilitates the exchange of data and information across different devices and applications within a network or over the internet, acting as a central hub for managing and controlling communication protocols.
Web/Cloud Server
A computer system that serves web pages to users over the internet, processing incoming HTTP requests and responding with the appropriate web content. A cloud server is a virtual server hosted in a cloud computing environment.
Email Encryption
A security measure that encodes the content of email messages to prevent unauthorized access during transmission. This ensures that only the intended recipient can read the message, using techniques such as symmetric or asymmetric encryption.
Private Key Encryption
Also known as symmetric encryption, uses a single secret key for both encrypting and decrypting data, requiring secure sharing of the key between parties.
Public Key Encryption
Also known as asymmetric encryption, employs a pair of keys: a public key for encryption and a private key for decryption, facilitating secure communication without the need to exchange secret keys beforehand.