Intro to computing Flashcards

(61 cards)

1
Q

Computer Networking

A

Links computers for shared resources through the internet. Requires computers to access multiple netwroks and share their resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet Privacy

A

Deals with the fundamental human rights of a person’s privacy on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Importance of internet privacy

A

is the control of personal identity and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Without internet privacy

A

interested third-party companies will collect and analyze every online activity to take advantage of these data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different techniques to protect internet privacy

A
  • Securing Web Browser
  • Using a virtual private network (VPN)
  • Double-Checking unfamiliar links
  • Limited Sharing on Social Media
  • Using Multi-Factor Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Securing Web Browser

A

Such as Google Chrome and Mozilla Firefox, although a total security is not guaranteed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using a Virtual Private Network (VPN)

A

It is the best way to have internet privacy. it does not change ethe IP Address, it also protects incoming and outgoing internet traffic with extensive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Double-Checking Unfamiliar Links

A

Double-check the URL to see if it has the correct format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Limited Sharing on Social Media

A

Platforms like Instagram, Facebook and Twitter are all publicly accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using multi-factor authentication

A

Multi-factor or two-authentication is an added verification step besides a conventional password. Google applies this wherein the users provide a specific code sent to their smartphones to access their accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Security

A

Ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Technologies

A
  • Firewall
  • Intrusion Detection System
  • Wi-Fi protected Access 3 (WPA3)
  • Virtual Private Network
  • Email Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

It was previously stated that it monitors and filters incoming and outgoing network traffic. Additionally, it serves as a wall. either hardware or software between the trusted and untrusted external internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intrusion Detection System(IDS)

A

It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For a network IDS

A

a signature-based detection method is used wherein it seeks certain patterns of known malicious instructions sequences by targeting new malware sequences. It relies on machine learning to develop a model of trusted activity, then compares it to the current activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For a Host IDS

A

used to run on the individual hosts of a network, therefor it only monitors the inflow and outflow of traffic at the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Wifi-Protected Access 3 (WPA3)

A

The latest wireless network security certificate protocol by the Wi-Fi Alliance. It focuses its filtering at the ‘entry’ when a new device requests to connect to the network.

Also offers “forward Secrecy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virtual Private Network (VPN)

A

It connects any remote device to an enterprise wherein company data is hosted. Ensures that the online activities are publicly hidden. This feature makes it one of the most powerful network security tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Email Security

A

Emails allow scripts inside the device, it is easier for anyone to write a code in an email and send it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Revenue Loss

A

One of the most impactful consequences companies face during an internet, network downtime.

Proper cable management is the best way to ensure network reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Maintenance Cost

A

Repairing damages internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.

Daily monitoring of the cables and network devices is encouraged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Lesser Productivity

A

Internet and network failure significantly affect productivity as tasks heavily rely on the internet.

It is advisable to provide a backup network and a backup internet service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Personal Area Network (PAN)

A

The smallest type of network with a limited span interconnects compatible personal devices. Examples computer to printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Local Area Network (LAN)

A

Used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Campus Area Network (CAN)
An enterprise network covering multiple building, house or several buildings in a limited area.
25
Metropolitan Area Network (MAN)
This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly.
26
Wide Area Network (WAN)
A much larger network covering vast areas, such as cities, provinces, and countries. WAN can also be a bigger network consistensing of LANs and MANs
27
Network Architecture
A diagram displaying the structure of network devices and services to serve the clients' connectivity needs
27
Common types of network Architecture
Access networks Networks for data centers Wide-area networks (WANs)
28
Access Networks
In campuses and branches bring users and devices together, such as linking employees in a corporate building
29
Networks for data centers
In a company link multiple servers with data and application make them easily accessible to users.
30
Wide-area Networks (WANs)
Connects users to programs and services, such as hospital employees connecting to health applications
31
The Open System Interconnection Model (OSI)
Reference model of the International Organization for Standardization was developed in 1984 as an open standard for every communication system to allow the interlinking the different times of different types of networks Aims to provide a structure for networking that secures compatibility in the network hardware and software and expedites the advancement of upcoming networking technologies.
32
Physical Layer
Gives electrical and mechanical connections to the network
33
Data Link Layer
Handles error recovery, flow control, and sequencing of terminals that are either sending or receiving. It is the media of access control (MAC) layer where MAC addressing is defined.
34
Network Layer
Acts as the network controller that receives outgoing messages and combines messages and segments into packets with a header detailing the routing information
35
Transport Layer
Liable for end-to-end delivery between devices. It deals with message integrity between source and destination and segmenting and reassembling packets.
36
Session Layer
Proves the control functions required to start, manage, and end connections to satisfy user requests.
37
Presentation Layer
Accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption
38
Application Layer
It interacts with application programs with communication components such as web browser and emails. It is responsible for recording a message, understanding the request, and identifying the information needed to support it.
39
Network Types and Devices
These are devices required for communication and interaction between components on a computer network, either wired or wireless.
40
Wired Network
uses cabling and connectors to initiate network connections
41
Wireless Network
uses radio signals to initiate network connections. It is the most common network configuration today.
42
Network Type Advantages Disadvantages - Wired
Faster network data transfer speed Inexpensive setup Not susceptible to outside interference Specialized tools for cable connections Labor-intensive
43
- Wireless
User mobility Simple installation Security issues Slower data transfer
44
LAN Ethernet Cable
Connects devices within a local area network. It is limited by length and durability specifications resulting in a bad signal if the cable is too long or of poor quality.
45
Hub
– interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.
46
Switch
– initiates a direct connection from the sender to the destination bypassing the data traffic to ensure data privacy, unlike a hub. It is best for interconnecting networking devices
47
Cable Modem
– uses a cable connection to create a broadband network connection from a home network to the internet service provider (ISP). This setup needs a splitter to divide the cable TV from the home network.
48
Servers
– provide resources, data, services, and programs to other computers or clients over a network. It is tasked to handle complex operations such as databases, emails, and shared files.
49
Firewall
– a security device that monitors and secures incoming and outgoing network traffic based on established security policies. It is essentially the barrier between a private internal network and the public Internet.
50
Wireless Access Point
– connects wireless devices and provides a connection to wired LANs. The data transfer speed for access points relies on the wireless technology of the clients.
51
Wireless Router
– consists of a router, switch, and wireless access point that uses radio frequency to link networking devices. It is the most common way to connect wireless LANs to the ISP’s access device.
52
Wi-Fi Modem
– combines the functionality of a modem and a router, thus making it a convenient source for Internet connectivity.
53
Network Topologies
LAN is described by the protocol and the topology used for network access. It is the physical and logical arrangement of nodes such as a switch or hub and connections in a network
54
The networking protocol
is the rule for users to exchange information.
55
Point-to-Point
– the simplest network topology where two devices, like a computer or router, are connected directly. With this, the communication only flows between the two devices.
56
Token Ring
– Its deterministic nature ensures access to message transmissions at regular or fixed time intervals for each connected station. A disadvantage is that if an error changes the token pattern, it might stop circulating, causing data traffic to stop.
57
Bus
– occurs when computers share the media for data transmission using a coaxial cable, preventing data transmission from being extremely bandwidth efficient.
58
Star
– the most common networking topology in LANs today, where all the devices connect to a central switch or hub.
59
Mesh
– it is when the networking devices are directly connected where several paths exist between the end devices. Mesh topology can be divided into two types based on paths; fully meshed and partially meshed.