Acronyms 2 C182 Flashcards

(71 cards)

1
Q

PAN

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network consisting of a central cable to which all network devices are attached

A

Bus Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network in which all network devices connect to one another through a single central device

A

Star Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network that connects devices in a loop

A

Ring network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connects every device to every other device

A

Mesh network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technical rules governing data communication

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information

A

Client-Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network model where all computers on the network are equal and data may be shared from computer to computer

A

Peer-To-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses many independent computers to provide computation or services

A

Cluster Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

A

Grid Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Large pools of shared computers that can be allocated to clients as needed

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two types of twisted Cables

A

UTC - Unshielded Twisted Cable

STC - Shielded Twisted Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network bandwidth is measured in

A

Mbps - Megabits Per Second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CAT 1 bandwidth speed

A

1 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CAT 2 bandwidth speed

A

4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAT 3 bandwidth

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CAT 4 bandwidth speed

A

16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CAT 5 bandwidth speed

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CAT 5e bandwidth speed

A

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CAT 6 bandwidth speed

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CAT 6a bandwidth speed

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CAT 7 bandwidth speed
10 Gbps
26
Uses a single data channel in which the whole bandwidth of the transmission medium is dedicated to one data channel at a time
Baseband
27
Used in computer networks and to deliver cable TV sevice
Coaxial Cable
28
A multiple data channel system in which the bandwidth of a transmission medium carries several data streams at the same time
Broadband
29
Monitors network traffic and blocks traffic that triggers its safety rules.
Firewall
30
(lowercase i) internet
A network of networks
31
(Uppercase I) Internet
The World Wide Web
32
Extends the range of cabling types so connections can be made by increasing the strength of the network sgnal
Repeaters
33
Connects to different types of network and provide management of the message
Bridge
34
Used on LANs to reduce network traffic
Switches
35
Acts as a gateway to the internet
Router (Gateway)
36
DARPA
Defense Advances Research Projects Agency
37
Who founded the internet as a project in the early 1960s?
DARPA
38
The internet uses IP addresses as
Unique Identifiers
39
IPv4 uses a _______ address pattern
32-bit
40
IPv6 uses a ______ address pattern
128-bit
41
ICANN
Internet Corporation for Assigned Names and Numbers
42
Awards blocks of consecutively numbered IP addresses to ISPs
ICANN
43
A section of the internet operated by a single authority
Domain
44
TLD
Top-Level Domain
45
COM, EDU, GOV, NET are examples of
Top-Level Domains
46
HTTP
Hypertext Transfer Protocol
47
SMTP
Simple Mail Transfer Protocol
48
POP3
Post Office Protocol version 3
49
IMAP
Instant Messaging Access Protocol
50
VoIP
Voice over Internet Protocol
51
CDNs
Content Delivery Networks
52
XML
Extensible Markup Language
53
Each hypertext document available through the World Wide Web is given a unique address called ______
Uniform Resource Locator (URL)
54
HTML
Hypertext Markup Language
55
A language used to create webpages
HTML
56
Software intentionally designed to cause damage to a computer, server, client, or computer network
Malware (viruses, worms, spyware, phishing)
57
Software that causes unintentional harm
Software bug
58
Infects a computer by inserting itself into programs that already reside in the machine
Virus
59
Forwards copies of itself to other machines in a network resulting in the detriment of individual machines or the operations of the network.
Worms
60
Collects information about the computer's activities and reports back to the instigator
Spyware
61
Obtains private information by simply asking for it
Phishing
62
The process of overloading a computer with messages resulting in suffocation in the network
Denial of Service
63
DoS
Denial of Service
64
When a hacker intercepts the data as it is traveling to or from the victim's device
Packet Sniffing (Man-in-the-Middle)
65
An application that uses a large dictionary to guess the victim's password
Dictionary Attack
66
Tries to identify the hash value of a password, then converts it back to plain text
Rainbow Tables
67
A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
Brute Force
68
Three Triads
Confidentiality, Integrity, Availability
69
A software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server
Proxy Server
70
Monitors network behavior such as the origin and volume traffic, looking for anomalies to proactively or reactively mitigate unwanted occurances
Network Auditing Software
71
Software that detects and removes known viruses from the network
Antivirus