Intro to computing Flashcards

1
Q

Computer Networking

A

Links computers for shared resources through the internet. Requires computers to access multiple netwroks and share their resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet Privacy

A

Deals with the fundamental human rights of a person’s privacy on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Importance of internet privacy

A

is the control of personal identity and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Without internet privacy

A

interested third-party companies will collect and analyze every online activity to take advantage of these data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different techniques to protect internet privacy

A
  • Securing Web Browser
  • Using a virtual private network (VPN)
  • Double-Checking unfamiliar links
  • Limited Sharing on Social Media
  • Using Multi-Factor Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Securing Web Browser

A

Such as Google Chrome and Mozilla Firefox, although a total security is not guaranteed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using a Virtual Private Network (VPN)

A

It is the best way to have internet privacy. it does not change ethe IP Address, it also protects incoming and outgoing internet traffic with extensive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Double-Checking Unfamiliar Links

A

Double-check the URL to see if it has the correct format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Limited Sharing on Social Media

A

Platforms like Instagram, Facebook and Twitter are all publicly accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using multi-factor authentication

A

Multi-factor or two-authentication is an added verification step besides a conventional password. Google applies this wherein the users provide a specific code sent to their smartphones to access their accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Security

A

Ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Technologies

A
  • Firewall
  • Intrusion Detection System
  • Wi-Fi protected Access 3 (WPA3)
  • Virtual Private Network
  • Email Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

It was previously stated that it monitors and filters incoming and outgoing network traffic. Additionally, it serves as a wall. either hardware or software between the trusted and untrusted external internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intrusion Detection System(IDS)

A

It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For a network IDS

A

a signature-based detection method is used wherein it seeks certain patterns of known malicious instructions sequences by targeting new malware sequences. It relies on machine learning to develop a model of trusted activity, then compares it to the current activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For a Host IDS

A

used to run on the individual hosts of a network, therefor it only monitors the inflow and outflow of traffic at the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Wifi-Protected Access 3 (WPA3)

A

The latest wireless network security certificate protocol by the Wi-Fi Alliance. It focuses its filtering at the ‘entry’ when a new device requests to connect to the network.

Also offers “forward Secrecy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virtual Private Network (VPN)

A

It connects any remote device to an enterprise wherein company data is hosted. Ensures that the online activities are publicly hidden. This feature makes it one of the most powerful network security tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Email Security

A

Emails allow scripts inside the device, it is easier for anyone to write a code in an email and send it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Revenue Loss

A

One of the most impactful consequences companies face during an internet, network downtime.

Proper cable management is the best way to ensure network reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Maintenance Cost

A

Repairing damages internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.

Daily monitoring of the cables and network devices is encouraged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Lesser Productivity

A

Internet and network failure significantly affect productivity as tasks heavily rely on the internet.

It is advisable to provide a backup network and a backup internet service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Personal Area Network (PAN)

A

The smallest type of network with a limited span interconnects compatible personal devices. Examples computer to printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Local Area Network (LAN)

A

Used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Campus Area Network (CAN)

A

An enterprise network covering multiple building, house or several buildings in a limited area.

25
Q

Metropolitan Area Network (MAN)

A

This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly.

26
Q

Wide Area Network (WAN)

A

A much larger network covering vast areas, such as cities, provinces, and countries. WAN can also be a bigger network consistensing of LANs and MANs

27
Q

Network Architecture

A

A diagram displaying the structure of network devices and services to serve the clients’ connectivity needs

27
Q

Common types of network Architecture

A

Access networks
Networks for data centers
Wide-area networks (WANs)

28
Q

Access Networks

A

In campuses and branches bring users and devices together, such as linking employees in a corporate building

29
Q

Networks for data centers

A

In a company link multiple servers with data and application make them easily accessible to users.

30
Q

Wide-area Networks (WANs)

A

Connects users to programs and services, such as hospital employees connecting to health applications

31
Q

The Open System Interconnection Model (OSI)

A

Reference model of the International Organization for Standardization was developed in 1984 as an open standard for every communication system to allow the interlinking the different times of different types of networks

Aims to provide a structure for
networking that secures compatibility in the network hardware and
software and expedites the advancement of upcoming networking
technologies.

32
Q

Physical Layer

A

Gives electrical and mechanical connections to the network

33
Q

Data Link Layer

A

Handles error recovery, flow control, and sequencing of terminals that are either sending or receiving. It is the media of access control (MAC) layer where MAC addressing is defined.

34
Q

Network Layer

A

Acts as the network controller that receives outgoing messages and combines messages and segments into packets with a header detailing the routing information

35
Q

Transport Layer

A

Liable for end-to-end delivery between devices. It deals with message integrity between source and destination and segmenting and reassembling packets.

36
Q

Session Layer

A

Proves the control functions required to start, manage, and end connections to satisfy user requests.

37
Q

Presentation Layer

A

Accepts and structures the messages for an application by converting the message from one code to another. It also processes data compression and encryption

38
Q

Application Layer

A

It interacts with application programs with communication components such as web browser and emails. It is responsible for recording a message, understanding the request, and identifying the information needed to support it.

39
Q

Network Types and Devices

A

These are devices required for communication and interaction between components on a computer network, either wired or wireless.

40
Q

Wired Network

A

uses cabling and connectors to initiate network connections

41
Q

Wireless Network

A

uses radio signals to initiate network connections. It is the most common network configuration today.

42
Q

Network Type Advantages Disadvantages

  • Wired
A

Faster network data
transfer speed

Inexpensive setup

Not susceptible to
outside interference

Specialized tools for
cable connections

Labor-intensive

43
Q
  • Wireless
A

User mobility

Simple installation

Security issues

Slower data transfer

44
Q

LAN Ethernet Cable

A

Connects devices within a local area
network. It is limited by length and durability specifications
resulting in a bad signal if the cable is too long or of poor quality.

45
Q

Hub

A

– interconnects networking devices but risks the broadcast
of data it receives to all devices connected to it.

46
Q

Switch

A

– initiates a direct connection from the sender to the
destination bypassing the data traffic to ensure data privacy,
unlike a hub. It is best for interconnecting networking devices

47
Q

Cable Modem

A

– uses a cable connection to create a broadband
network connection from a home network to the internet service
provider (ISP). This setup needs a splitter to divide the cable TV
from the home network.

48
Q

Servers

A

– provide resources, data, services, and programs to
other computers or clients over a network. It is tasked to handle
complex operations such as databases, emails, and shared files.

49
Q

Firewall

A

– a security device that monitors and secures incoming
and outgoing network traffic based on established security
policies. It is essentially the barrier between a private internal
network and the public Internet.

50
Q

Wireless Access Point

A

– connects wireless devices and provides
a connection to wired LANs. The data transfer speed for access
points relies on the wireless technology of the clients.

51
Q

Wireless Router

A

– consists of a router, switch, and wireless
access point that uses radio frequency to link networking devices.
It is the most common way to connect wireless LANs to the ISP’s
access device.

52
Q

Wi-Fi Modem

A

– combines the functionality of a modem and a
router, thus making it a convenient source for Internet
connectivity.

53
Q

Network Topologies

A

LAN is described by the protocol and the topology used for network access.

It is the physical
and logical arrangement of nodes such as a switch or hub and
connections in a network

54
Q

The networking protocol

A

is the rule for users to exchange
information.

55
Q

Point-to-Point

A

– the simplest network topology where two
devices, like a computer or router, are connected directly. With
this, the communication only flows between the two devices.

56
Q

Token Ring

A

– Its deterministic nature ensures access to message
transmissions at regular or fixed time intervals for each connected
station.

A disadvantage is that if an error changes the token pattern, it
might stop circulating, causing data traffic to stop.

57
Q

Bus

A

– occurs when computers share the media for data
transmission using a coaxial cable, preventing data transmission
from being extremely bandwidth efficient.

58
Q

Star

A

– the most common networking topology in LANs today,
where all the devices connect to a central switch or hub.

59
Q

Mesh

A

– it is when the networking devices are directly connected
where several paths exist between the end devices.
Mesh topology can be divided into two types based on paths; fully
meshed and partially meshed.