Quizlet Review Notes
Overview of the Session
Initial discussion about whether to use Kahoot or Quizlet for review.
Participant preferences leaned towards a Quizlet activity due to familiarity with Kahoot.
Interactive Review Activities
Quizlet Preference:
Participants felt that the Kahoot format had become repetitive, leading them to favor Quizlet.
Discussion of activities between participants, with replacement of music by suggestion of possible playlists, including mentioning a Russian heavy metal band, "Slaughter to Prevail."
Reference to Music:
Preferences varied from techno to heavy metal music to enhance engagement during the review.
Device and Networking Concepts
Various networks and devices were discussed:
Firewall:
Definition: A firewall is generally hardware-based and protects the network of computers, autonomously as opposed to a single computer.
Mentioned as a part of the conversation around network security.
Router vs. Switch:
Router: Forwards packets between networks.
Switch: Creates networks. Each switch creates its own local area network (LAN). To connect multiple LANs, a router is necessary.
Key statement: "A switch creates networks, and a router connects networks."
NFC and Bluetooth:
NFC (Near Field Communication): Wireless technology for short-range communication, often described as "paired" devices.
Bluetooth: Discussed as a quick connection that creates a personal area network.
Digital Communication Protocols:
Analog Video Cable: Described as having 15 pins.
AV Connection: Comprises three video cables and two audio cables.
Network Attached Storage (NAS):
Used for collaboration on files across multiple locations.
Compression Software: Used for reducing the size of information for archival purposes.
Software and Encryption
Encryption types:
Symmetric Encryption: Same key used to encode and decode data.
Asymmetric Encryption: Utilizes two keys, one for encoding and one for decoding messages.
SSL/TLS: Used as encryption methods to secure information sent and from web pages.
Malware Types:
Spyware: Software that locates and saves data from users without their knowledge.
Keyloggers: Monitor keystrokes, used often for capturing usernames and passwords.
Ransomware: Software that encrypts data until ransom is paid.
Network Security and Management
Access Control:
Defined as essential for securing networks by filtering and allowing only specific devices.
MAC Address Filtering: Allows access based on the MAC addresses of devices.
Guest Account: Defined as an account with restricted permissions for minimal operations.
Proxy Server: Functions as a gateway between a user and the internet, controlling access and enhancing security.
Further Network and Performance Discussions
Cookies:
Cookies track users’ activity on websites for purposes often related to marketing.
Tracking Cookies are created by third parties.
Automatic Updates: Feature that allows Windows to update automatically over the Internet.
Open Source Software: Software that includes its source code and can be modified by anyone.
Networking:
File and printer sharing allows sharing configurations via networked devices.
Technical Definitions and Certifications
IPv4 Address: A logical 32-bit address assigned to devices on a network.
DNS (Domain Name System): Responsible for resolving domain names to IP addresses.
Device Installation Files: Mention of file types such as
.isofor Windows installations and.dmgfor Mac OS installations.Various Technical Terms: Many terms and definitions were defined during the session in relation to computing and network configurations.
Conclusion and Next Steps
Recognized participant understanding and readiness for next steps in the learning journey.
Suggested taking a break before continuing with evaluations and further review tasks.