computer 2 Flashcards

(75 cards)

1
Q

communication system

A

are electronic system that transmit data from one location to another whether wired or wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

communication system has four basic elements

A

1-sending and receiving devices
2-connection deceives
3-communction channels
4-data transmission specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

communication channel

A

carry data from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two categories of communication channels

A

1-physical connection (wire or cable)
Twisted-pair cable
coaxial cable
fiber-optic cable
2-wireless connection (move data through the air
WIFI, Bluetooth , microwave , cellular satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

telephones send and receive

A

analogue signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

computers use what type of signals

A

digital signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

four types of modems

A

1- telephone modem
2- digital subscriber line modem
3- cable modems
4-wireless modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

telephone modems

A

use a telephone line very slow and user can’t make outgoing calls or receive incoming calls while online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

digital subscriber line

A

work over phone users can still use phone services while online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cable modem

A

use the coaxial cables as your television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

wireless modems

A

portable high-speed connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data transmission

A

for data transmission to be successful , devices must follow a set of rules for exchanging information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

protocols

A

are rules for exchanging data between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet protocols

A

HTTP
HTTPS
TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP

A

hypertext transfer protocol
transfer data over the web nor secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTPS

A

hypertext transfer protocol secure
use protect the transfer of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP/IP

A

Transmission control protocol internet protocol
identify sending and receiving devices breaking the information into small parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network

A

is a communication system that connects two or more computers so that they can exchange information and share resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NODE

A

any device that is connected to a network . It could be a computer , printer or data storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

client

A

node that requests and uses resources available from other nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

server

A

A node that shares resources with other nodes . Dedicated servers specialize in performing specific tasks . Depending on the specific task .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

router

A

a node that forwards or routes data packets from one network to their destination in another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Switch

A

central node that coordinates the flow of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

which network topologies that each device directly connects with all other device in the network

A

mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Local area network (LAN)
are networks consisting of computer and other devices that are physically near each other
26
Metropolitan area network (MAN)
are used as links between office buildings in a city
27
Wide area network (WAN)
are word-wide networks that use microwaves relays and satellites to reach over long distance
28
what is the widest WAN
internet
29
Network architecture
describes how a network is arranged and how resources are coordinated and shared
30
types of network topology
1-bus 2-ring 3-star 4-tree 5-mesh
31
32
ring
each device is connected to two other devices , forming a ring (when a message is sent ,it's passed around the ring until it reaches the intended destination
33
Star
each device is connected directly to a central network switch *The star network is the most widely used network topology today
34
TREE
each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes, and so forth, forming a treelike structure.
35
mesh
is the newest type and does not use a specific physical layout. Each node have more than one connection to the other nodes. (Wireless technologies are frequently used to build mesh networks
36
network security
Organizations face the challenge of ensuring that only authorized users have access to network resources across the Internet. Securing large computer networks requires specialized technology
37
Firewall
consists of hardware and software that control access to a company's intranet Ex: Proxy Server. The proxy server decides whether it is safe to let a particular message or file pass into or out of the organization’s network
38
three privacy issues
1-accuracy 2-property 3-access
39
ACCURACY
relates to the responsibilities of those who collect data to ensure the data is correct
40
Virtual private network VPN
creates a secure private connection between remote user and an organization internal network
41
PROPERTY
relates to who owns the data
42
Access
relates to the responsibility of those who have data control and able to use that data
43
Private networks
many organizations monitor employee email and computer files using special software called employee monitoring software these programs record everything you do on the computer
44
History file
includes the location, or address of sites that you have recently visited
45
Temporary internet files
whenever you visit a website these files are saved by your browser . If you leave a site and then return later , these files are quickly redisplay web content
46
COOKIES
are small data files that are deposited on your hard disk from website you have visited
47
WEB BUGS
are invisible images or HTML code hidden within web page , can be used to transmit information without your knowledge
48
SPYWARE
are programs designed to secretly record and report and individual's activities on internet
49
KEYSTROKE LOGGERS
most dangerous type of spyware that record your activities such as , credit card , passwords
50
best defense against spyware
Use antispyware or spy removal programs
51
Cybercrime or Computer Crime
is any criminal offense that involves a computer and a network
52
Cybercrimes can take various forms including the creation of
-malicious programs -identity theft -internet scams -cyberbullying
53
crackers
is someone who creates and distributes Malicious Programs (malware). They are specifically designed to damage computer system
54
most common types of malware
1-viruses 2-worms 3-trojan horses
55
Identity Theft
is the illegal assumption of someone's identity for the purpose of econocomic gain
56
internet scams
an internet scam is a deceptive act or operation designed to trick individuals into providing personal information
57
Cyberbullying
is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person
58
computer security
is concerned with keeping hardware ,software, data and programs safe
59
Restricting access
limit access to authorized persons using such measure as passwords and firewall
60
Encrypting data
code all messages sent over a network
61
Anticipating disasters
prepare for disasters by ensuring physical security and data security through a disaster recovery plan
62
preventing data loss
routinely copy data and store it at remote locations
63
Computer ethics
are guidelines for the morally acceptable use of computers in our society
64
Copyright
is a legal concept that gives content creators the right to control use and distribution of their work. * Material that can be copyrighted include paintings, books, music, films and video games.
65
Plagiarism
means representing some other person’s work and ideas as your own without giving a credit to the original source. Ex.copying and pasting Web content into a paper or report.
66
Turnitin service
examines a papers content and compares it to a wide range of electronic documents to detect plagiarism.
67
A System
is a collection of activities and elements organized to accomplish a goal
68
Systems analysis and design
a six-phase problem-solving procedure that makes up the systems life cycle.
69
The six-phase of systems life cycle are
1-preliminary investigations 2-system analysis 3-system design 4-system development 5-systems implementation 6-system maintenance
70
Preliminary investigation
the information problems or needs are identified
71
Systems analysis
the present system is studied in depth. New requirements are specified
72
Systems design
A new or alternative information system is designed.
73
Systems development
New hardware and software are acquired, developed, and tested.
74
Systems implementation
The new information system is installed, and people are trained to use it.
75
System maintenance
In this ongoing phase, the system is periodically evaluated and updated as needed.