Flashcards in Exam #3 Flashcards Deck (186):
Internet Protocol Address
a set of four groups of numbers; how computers identify each other on the internet
social networking, wikis, blogs, podcasts, and webcasts. (web 2.0= collaborative technology/programs
using the web to communicate and share information among your friends and others.
a web application that allows users to add, remove, or edit its content.
project management tools
incorporate tasks and calendars so the individual components as well as the entire project can stay on schedule.
form of digital media comprised of a series of audio or video files that are distributed over the internet.
Real Simple Syndication- sends the latest content of the podcast series automatically to an aggregator, like itunes or feedspot.
usually live broadcast of audio or video content over the internet.
electronic mail- a written message sent or received over the Internet- still remains the most widely used form of communication on the internet.
yahoo, gmail, managed with your web browser and allows you to access you email from the web.
electronic commerce- electronic process of conducting business online.
B2C (Business to consumer)
transactions take place between businesses and consumers. (Amazon)
businesses buy and sell goods and services to other businesses.
transactions occur when consumers sell to each other through sites such as eBay.
Businesses offering services in to the government
consumer to government transactions (taxes)
uses social networks to assist in marketing and purchasing.
anything that involves one or more form of media in addition to text.
streaming media via the internet without having to download it.
a software that lets you locate, view, and navigate the web.
URL (Uniform resource locator)
A website's unique address.
part of the URL. Domain name consist of two parts: the site's host and a suffix that indicates the type of organization
Hypertext transfer Protocol. The protocol that allows files to be transferred from a web server so that you can see them on your computer by using a browser.
a computer that hosts the website you're requesting
file transfer protocol; designed to transfer large files and downloads.
location that maintains the computers that store the website files.
top level domain
suffix after the dot in a URL
information in each page separated by a slash on the URL
specially coded elements that let you jump from one web page to another.
easy way to return to specific webpage. places a marker of the site's URL an a retrievable list in your browser's toolbar.
A subject directory organizes Internet sites by subject, and is usually maintained. by humans instead of software
a set of program that search s the web for keywords and then returns a list of the sites on which those keywords are found.
specific word you wish to look for or query)
criteria or question for the search engine database.
search other search engines rather than individual websites (dog pile)
words such as AND NOT and OR that describe the relationships between keyword i a search
the result of someone else's creativity or knowledge; music, writing, and software.
involves the use of digital technologies such as the internet, cellphones, or videos to bully another.
not being required to reveal you behavior to others.
where are you? apps track you location with your permission.
simply two or more computers that are connected via software and hardware so they can communicate with each other.
each device connected to a network is referred to as a node.
installing hardware and software; monitoring efficiency; configure security
data transfer rate
bandwith; maximum speed that data can be transmitted.
actual speed of data transfer
network design and size
personal area network. devices close to one person; bluetooth mobile hotspots
local area network. connects to nodes in close proximity; school, starbucks
Home area network; used to connect home nodes to the internet
Metropolitan area network
provides network to large geographical areas, like cities.
wide area network
spans a large physical distance. Internet is the largest wan, coveringthe globe.
peer to peer
two or more computers share resources without having to connect to a separate server
wireless fidelity- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
ability of new devices to use earlier standards
The kind of pathways used to transmit information
twisted pair cable
unshielded twisted pair cable
cat 5 and cat 6
cable tv cables
fiber optic cables
A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. ... Fiber optic cables have a much greater bandwidth than metal cables.
A network adapter is the component of a computer's internal hardware that is used for communicating over a network with another computer. It enable a computer to connect with another computer
NIC (network interface card)
It is an expansion card that enables a computer to connect to a network; such as a home network,
A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.he Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks" of an efficient size for routing.
Routers take information that arrives through your broadband signal via a modem, decipher it, and deliver it to your computer. The router will also choose the best route for the data packet so that you receive the information quickly.
In short, your router creates a network between the computers in your home, while your modem connects that network—and thus the computers on it—to the internet. When you connect to Wi-Fi, you’re really connecting to your router, which forwards traffic between the internet and your computer. Many internet providers offer a combined modem/router unit that performs both these functions in one device.
An ethernet switch is a device used to build a network connection between the attached computers (allows computers to talk to each other). It differs from an ethernet hub: While a hub will send incoming data packets to all ports, a switch understands the packets' addressing scheme and will send any data packet only to its destination port
Internet of things
connecting ordinary things like lights and doors to a computer network to make them "intelligent". An embedded system or a computer connects each thing together in a network and to the internet.
Network operating system
A specialized operating system for a network device such as a router, switch or firewall.
form of broadband Internet access in which infrastructure previously used solely for cable television carries digital Internet.
Wideor high speed bandwidth
Digital subscriber line
DSLa way to transmit digital data over a telephone line. Telephone lines only transmit a limited spectrum of signals
Fiber optic service
Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling when high bandwidth, long distance, or immunity to electromagnetic interference are required.
Satélite internet acces
Satellite Internet access is Internet access provided through communications satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds,
Uses 3G or 4g or lye when wifi isn't available.
Latest service standard. Provides people with network will roaming
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.
Network attached storage
Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.
establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge.
Cyber crime, or computer related crime, is crime that involves a computer and a network.
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name,
In computing, a hacker is any skilled computer expert that uses their technical knowledge to overcome a problem
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
Sniffer:"; is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
any malicious computer program which is used to hack into a computer by misleading users of its true intent.
often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
Denial of service
Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Denial of service
Zombie continuously sends requests and jams a network server.
Distributed denial of service
Distributed denial-of-service attacks on root nameservers are Internet events in which distributed denial-of-service attacks target one or more of the thirteen Domain Name System root nameserver clusters.
A botnet is a number of Internet-connected devices used by a botnet owner to perform various tasks. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, send spam, and allow the attacker access to the device and its connection.
process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes
a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
Boot sector virus
Executes when computer boots
Triggers when logic condition is met
Certain date or passage of time
Attached to an application software file (word,excel,etc)
Finally, attached files share many of the same hazards as those found in peer-to-peer filesharing. Attached files may contain trojans or viruses.
Ransomware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it.
Rewrites its codes so it can't be detected
Infects different file types to avoid antivirus detection
Erases own code from hard drive and hides in memory.
refers to psychological manipulation of people into performing actions or divulging confidential information.
any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.
is any software package that automatically renders advertisements in order to generate revenue for its author.
Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.
is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Pose no security threat; but does allow accessibility to site login info
Creating a legitimate scenario to establish trust
Using personal email to gather personal info
Through a website, malicious code placed on your computer.
unauthorized copying, transmitting, or view of sensitive/confidential information
A targeted attack via email, against individuals using prior knowledge.
a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
is computer software used to prevent, detect and remove malicious software.
Virus signatures are just strings of code that are used to identify individual viruses; for each virus, the antivirus designer tries to choose a unique signature string that will not be found in a legitimate program
Quarantine is a function of antivirus software that isolates infected files on a computer's hard disk. Files put in quarantine are no longer capable of infecting their hosting system.
The strength of a password is a function of length, complexity, and unpredictability
A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human.
Biometric authentication device
A Biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, Iris prints and voice recognition.
Virtual private network
Virtual network extending a single private network across a public network like the Internet, appearing to users as a private network link
Multi factor authentication
2 or 3 forms of ID (debit card and PIN)
Copying and archiving of computer data
Program Files is the directory name of a standard folder in Microsoft Windows operating systems in which applications that are not part of the operating system are conventionally installed.
A data file is a computer file which stores data to be used by a computer application or system.
An incremental backup is one in which successive copies of the data contain only that portion that has changed since the preceding backup copy was made.
Image back up
A Disk image, in computing, is a computer file containing the contents and structure of a disk volume or of an entire data storage device
is an appliance or device designed to protect electrical devices from voltage spikes.
Whole house surge protector
Lightning and other high-energy transient voltage surges can be suppressed with a whole house surge protector. These products are more expensive than simple single-outlet surge protectors, and often need professional installation on the incoming electrical power feed
pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Maintain network hardware and software
Peer to peer
An intranet is a private network accessible only to an organization's staff.
An extranet is a website that allows controlled access to partners, vendors and suppliers or an authorized set of customers
an electronic communication method that provides standards for exchanging data via any electronic means.
Electronic data interchange
Tracks who's logging into a server
a computer attached to a network that has the primary purpose of providing a location for shared disk access,
is a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally
Some (multifunction) printers have local storage (like a hard disk drive) to process and queue the jobs before printing.
A database server is a computer program that provides database services to other computer programs or to computers, as defined by the client–server model.
software that transfers electronic mail messages from one computer to another using a client–server application architecture.
common platform for a wide range of communications applications and allow equipment providers to add value at many levels of the system architecture.
A web server is a type of server that is used to host websites. Examples of web server software include Apache or IIS. A web server can host one, or many, websites.
. For example, Google Apps provides common business applications online that are accessed from a web browser, while the software and data are stored on the Internet servers.
Arrangement of the various elements of a computer network; topological structure of a network and may be depicted physically or logically
protocol or communication protocol is a set of rules in which computers communicate with each other.
Linear bus network
A bus network is a network topology in which nodes are directly connected to a common linear (or branched) half-duplex link called a bus.
A ring topology is a bus topology in a closed loop. Data travels around the ring in one direction. When one node sends data to another, the data passes through each intermediate node
Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central node, typically a switch or hub, which acts as a conduct to transmit messages.
For example, a tree network (or star-bus network) is a hybrid topology in which star networks are interconnected via bus networks.
Wireless access point
A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards
a computer program that operates or controls a particular type of device that is attached to a computer.
Media access control address
Unique physical ID (serial number) for all network devices
Sends data on a specific network route
Send information between two networks
A possessed object is any item that a user must carry to gain access to a computer or computer facility. Examples of possessed objects include badges, cards, and keys. Possessed objects are often used in combination with personal identification numbers.
Memorized passwords and codes
Brute force attack
a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly
Access card reader
Access control card readers are used in physical security systems to read a credential that allows access through access control points, typically a locked door. An access control reader can be a magnetic stripe reader, a bar code reader, a proximity reader, a smart card reader, or a biometric reader.
Optical carrier line
Optical Carrier transmission rates are a standardized set of specifications of transmission bandwidth for digital signals that can be carried on Synchronous Optical Networking (SONET) fiber optic networks.
Circuit switching is a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate.
Packet switching is a digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Internet Corporation for Assigned Names and Numbers. Organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces of the Internet
static (fixed or permanent) assigning of IP
dynamic basis, depending on its software and practices.
Phone book for up addresses. The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network
Root dns serve
directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the appropriate top-level domain (TLD)
1 of 13 servers contains the entire domain of top level IPs
An HTML element is an individual component of an HTML document or web page
Hypertext transfer protocol
an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.
HTTP Secure. A communications protocol for secure communication over a computer network which is widely used on the Internet
Server-side refers to operations that are performed by the server in a client–server relationship in a computer network. Typically, a server is a computer program, such as a web server, that runs on a remote server, reachable from a user's local computer or workstation.
Client side servers
Typically, a client is a computer application, such as a web browser, that runs on a user's local computer or workstation and connects to a server as necessary.
HTML Embedded scripting language
An applet is a type of program for computers. It is software. Very often, applets are written in Java. People run them in their Web browser. They are used to display a scrolling menu on a website, for example, the applet is also used to show some applications.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email to support:
Text in character sets other than ASCII
Non-text attachments: audio, video, images, application programs etc.
Message bodies with multiple parts
Header information in non-ASCII character sets
Checking the voice of the crowd. Getting feedback
Network of networks- the host of all networking
Subset of the internet- uses HTML and an IP address.