COMP MIDTERMS Flashcards

(43 cards)

1
Q

The different ways hardware, software,
and systems may connect and interact
these are called

A

connectivity and networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is one of the most popular forms of
wired networking, connecting devices to
a local area network (LAN) or the
internet using cables (often CAT5e or
CAT6). It provides dependable, fast
connectivity.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These connections, which provide
incredibly high capacity and
long-distance communication, convey
data via light signals. They are
frequently used in data centers and for
high-speed internet backbones.

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cable television and high-speed internet
connections frequently employ coaxial
wires. Their bandwidth and signal
quality are both excellent.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Wired Networking

A

Ethernet, Fiber Optic, Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Meaning of LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

With the help of this, devices may
connect wirelessly to the internet or a
local network without the need for
physical wires. In businesses,
residences, and public spaces, it is
extensively utilized.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A short-range wireless technology
called ______ links items like
headphones, keyboards, and
cellphones.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This permits wireless short-range
communication between devices,
frequently used for data transmission
and contactless payments.

A

NFC (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These wireless communication
protocols are intended for low-power,
low-data-rate uses, such as the Internet
of Things (IoT) and smart homes.

A

Zigbee and Z-Wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____________ technologies including
3G, 4G LTE, and 5G give mobile
devices wireless internet connection.
Data speed and coverage areas vary
between them.

A

Cellular Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet connection in remote or rural
locations where wired or cellular
networks would not be accessible is
made possible by this technology, which
makes use of satellites circling the
Earth.

A

Satellite Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Devices connect with one another
directly in ____ networks without the
need of a central server. This kind of
networking is frequently utilized for
decentralized apps and file sharing.

A

P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These establish private, secure
connections across a public network,
often the internet. In order to provide
remote access to private networks and
safeguard the privacy of data, they are
frequently utilized.

A

VPN (Virtual Private Networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a networking strategy that
divides the data plane, which sends
data packets, from the control plane,
which controls network traffic. More
flexibility and control over network
resources are provided by it.

A

Software-Defined Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Machines, sensors, and control systems
are connected via industrial networks in
manufacturing and automation
environments. Examples include
Profibus, Modbus, and Ethernet/IP.

A

Industrial Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________ provide limited access to the
public whereas _________ are internal
networks that are only accessible by
members of the company. They serve
as a platform for corporation and
internal communication.

A

Extranet, Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__________ have become
increasingly important as our reliance
on computers has grown.
Understanding topics such as
encryption, firewalls, and best practices
for safe computing is critical for
safeguarding personal and sensitive
data.

A

Security and Privacy

19
Q

refers to the policies and
procedures used to guard against
unwanted access, assaults, and
damage to computer networks,
systems, and data.

A

Cybersecurity

20
Q

Implementing _____ to
filter network traffic and prevent
malicious access.

21
Q

Using ______
programs to detect and remove
malware.

22
Q

Encrypting sensitive
data to make it unreadable to
unauthorized users.

23
Q

Implementing
strong user authentication and
authorization systems.

A

Access Controls

24
Q

Having plans
in place to address and recover from
security breaches.

A

Incident Response

25
includes defending physical assets, data centers, and equipment from damage or theft in addition to protecting against digital threats.
Physical Security
26
Protecting the confidentiality, integrity, and availability of information, including trade secrets, customer data, and proprietary information.
Information Security
27
Ensuring the safety of data during transmission across networks, preventing eavesdropping or data interception.
Network Security
28
refers to individuals' control over their personal information and how it is collected, used, shared, and stored by organizations and institutions.
Data Privacy
29
Key aspects of Data Privacy
Consent, Data Minimization, Transparency, Access and Correction, Data Protection
30
Concerns related to online activities, including browsing habits, social media usage, and online purchases. Online privacy tools like virtual private networks (VPNs) and browser privacy settings help protect online privacy.
Online Privacy
31
The balance between government surveillance for security purposes and protecting citizens' privacy rights is a complex issue that continues to evolve
Surveillance and Government Privacy
32
Security and privacy are fundamental rights that enable individuals to protect their personal information, communicate freely, and conduct online transactions with confidence
Individual Rights
33
____ is essential in the digital world. People and organizations need to trust that their information will be secure and their privacy respected when using online services
Trust
34
Numerous laws and regulations (e.g., GDPR, CCPA, HIPAA) require organizations to uphold security and privacy standards, with non-compliance resulting in legal consequences.
Legal and Regulatory Compliance
35
Businesses that prioritize security and privacy gain a competitive edge by building trust with customers and avoiding costly data breaches.
Business Competitiveness
36
Governments have a duty to protect national security interests while respecting citizens' privacy rights, often leading to debates and legal battles
National Security
37
Ethical questions arise regarding the responsible use of technology and data, requiring ongoing dialogue and ethical frameworks.
Ethical Considerations
38
is the first step in ensuring computer security and privacy
comprehension of hardware and software elements
39
refers to a computer's actual hardware, which comprises the central processor unit (CPU), memory, storage devices, and input/output devices.
Hardware
40
Operating systems, programs, and applications are all included in
Software
41
control computer resources and give software a platform to execute on.
Operating Systems
42
are used in almost every industry, including commerce, healthcare, education, entertainment, and research. They are extremely important in data analysis, modeling, design, and automation.
Computers
43
Emerging technologies such as artificial intelligence, quantum computing, and the Internet of Things (IoT) are influencing the future of computing, offering ever more amazing capabilities and uses.
Future Trends