Quizlet Review Notes

Overview of the Session

  • Initial discussion about whether to use Kahoot or Quizlet for review.

  • Participant preferences leaned towards a Quizlet activity due to familiarity with Kahoot.

Interactive Review Activities

  • Quizlet Preference:

    • Participants felt that the Kahoot format had become repetitive, leading them to favor Quizlet.

    • Discussion of activities between participants, with replacement of music by suggestion of possible playlists, including mentioning a Russian heavy metal band, "Slaughter to Prevail."

  • Reference to Music:

    • Preferences varied from techno to heavy metal music to enhance engagement during the review.

Device and Networking Concepts

  • Various networks and devices were discussed:

    • Firewall:

    • Definition: A firewall is generally hardware-based and protects the network of computers, autonomously as opposed to a single computer.

    • Mentioned as a part of the conversation around network security.

    • Router vs. Switch:

    • Router: Forwards packets between networks.

    • Switch: Creates networks. Each switch creates its own local area network (LAN). To connect multiple LANs, a router is necessary.

    • Key statement: "A switch creates networks, and a router connects networks."

    • NFC and Bluetooth:

    • NFC (Near Field Communication): Wireless technology for short-range communication, often described as "paired" devices.

    • Bluetooth: Discussed as a quick connection that creates a personal area network.

  • Digital Communication Protocols:

    • Analog Video Cable: Described as having 15 pins.

    • AV Connection: Comprises three video cables and two audio cables.

    • Network Attached Storage (NAS):

    • Used for collaboration on files across multiple locations.

    • Compression Software: Used for reducing the size of information for archival purposes.

Software and Encryption

  • Encryption types:

    • Symmetric Encryption: Same key used to encode and decode data.

    • Asymmetric Encryption: Utilizes two keys, one for encoding and one for decoding messages.

    • SSL/TLS: Used as encryption methods to secure information sent and from web pages.

  • Malware Types:

    • Spyware: Software that locates and saves data from users without their knowledge.

    • Keyloggers: Monitor keystrokes, used often for capturing usernames and passwords.

    • Ransomware: Software that encrypts data until ransom is paid.

Network Security and Management

  • Access Control:

    • Defined as essential for securing networks by filtering and allowing only specific devices.

    • MAC Address Filtering: Allows access based on the MAC addresses of devices.

  • Guest Account: Defined as an account with restricted permissions for minimal operations.

  • Proxy Server: Functions as a gateway between a user and the internet, controlling access and enhancing security.

Further Network and Performance Discussions

  • Cookies:

    • Cookies track users’ activity on websites for purposes often related to marketing.

    • Tracking Cookies are created by third parties.

  • Automatic Updates: Feature that allows Windows to update automatically over the Internet.

  • Open Source Software: Software that includes its source code and can be modified by anyone.

  • Networking:

    • File and printer sharing allows sharing configurations via networked devices.

Technical Definitions and Certifications

  • IPv4 Address: A logical 32-bit address assigned to devices on a network.

  • DNS (Domain Name System): Responsible for resolving domain names to IP addresses.

  • Device Installation Files: Mention of file types such as .iso for Windows installations and .dmg for Mac OS installations.

  • Various Technical Terms: Many terms and definitions were defined during the session in relation to computing and network configurations.

Conclusion and Next Steps

  • Recognized participant understanding and readiness for next steps in the learning journey.

  • Suggested taking a break before continuing with evaluations and further review tasks.