Introduction to Computing Flashcards

(50 cards)

1
Q

Links computers for shared resources through the internet.

A

Computer Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The smallest type of network with a limited span interconnects compatible personal devices.

A

Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is used to interconnect and share computer resources in an establishment such as a corporate building, house, or several buildings in a limited area.

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An enterprise network covering multiple buildings in a campus environment, including universities and large organizations.

A

Campus Area Network (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This covers multiple city buildings, traffic lights, and parking meters, connecting wirelessly.

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A much larger network covering vast areas, such as cities, provinces, and countries.

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a diagram displaying the structure of network devices and services to serve the clients’ connectivity needs.

A

Network Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brings users and devices together, such as linking employees in a corporate building.

A

Access Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Links multiple servers with data and applications and make them easily accessible to users.

A

Networks for data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connects users to programs and services, such as hospita employees connecting to health applications.

A

Wide-area networks (WANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An open standard for every communication system to allow interlinking of different types of networks.

A

Open Systems Interconnection Model (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gives electrical and mechanical connections to the network.

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Handles error recovery, flow control, and sequencing of terminals that are either sending or receiving.

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Acts as the network controller that receives outgoing messages and combines messages and segments into packets with a header detailing routing information.

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Liable for end-to-end delivery between devices.

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Provides the control functions required to start, manage, and end connections to satisfy user requests.

A

Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Accepts and structures the messages for an application by converting the message from one code to another.

A

Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It interacts with application programs with communication components such as a web browser and email.

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Uses cabling and connectors to initiate network connections.

A

Wired Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Uses radio signals to initiate network connections.

A

Wireless Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Connects devices within a local area network.

A

LAN Ethernet Cable

22
Q

Interconnects networking devices but risks the broadcast of data it receives to all devices connected to it.

23
Q

Initiates a direct connection from the sender to the destination bypassing the data traffic to ensure data privacy.

24
Q

Uses a cable connection to create a broadband network connection from a home network to the internet service provider.

25
Provide sources, data, services, and programs to other computers or clients over a network.
Servers
26
A security device that monitors and secures incoming and outgoing network traffic based on established security policies.
Firewall
27
Connects wireless devices and provides a connection to wired LANs.
Wireless Access Point
28
consists ofa router, switch, and wireless access point that uses radio frequency to link networking devices.
Wireless Router
29
Combines the functionality of a modem and a router.
Wi-Fi Modem
30
The physical and logical arrangement of nodes such as a switch or hub and connections in a network.
Network Topology
31
The simples network topology where two devices, like a computer or router, are connected directly.
Point-to-Point
32
Its deterministic nature ensures access to message transmissions at regular or fixed time intervals for each conected station.
Token Ring
33
Occurs when computers share the media for data transmission using a coaxial cable.
Bus
34
The most common networking topology in LANs today.
Star
35
It is when the networking devices are directly connected where several paths exist between the end devices.
Mesh
36
Deals with the fundamental human rights of a person's privacy on the internet.
Internet Privacy
37
Web browsers such as Google Chrome and Mozilla Firefox are the most used web browsers online for their specific features and familiarity.
Securing Web Browser
38
The best way to have internet privacy. It does not just change the IP address; it also protects incoming and outgoing internet traffic with extensive encryption.
Using a Virtual Private Network (VPN)
39
Never trust links from suspicions emails, sketchy websites, and advertisements.
Double-checking Unfamiliar Links
40
Social media playforms like Instagram, Facebook, and Twitter are all publicly accessible.
Limited Sharing on Social Media
41
An added verification step besides a conventional password.
Using Multi-factor Authentication
42
It ensures the integrity, confidentiality, and accessibility of computer networks.
Network Security
43
It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
Intrusion Detection System (IDS)
44
It is the latest wireless network security certificate protocol by the Wi-Fi alliance.
Wi-Fi Protected Access 3 (WPA3)
45
It connects any remote devices to an enterprise server wherein company data is hosted.
Virtual Private Network (VPN)
46
One of the most significant consequences companies face during an internet, and network downtime.
Revenue Loss
47
Repairing damaged internet and network lines consumes both time and maintenance costs, including acquiring new cables and upgraded network devices for replacement.
Maintenance Cost
48
Internet and network failure significantly affect productivity as tasks heavily rely on the internet.
Lesser Productivity
49
If internet and network failures regularly occur, it negatively impacts the employees and the company's clients and partners.
Damaged Reputation
50
Failures in operations and transactions mean failure to meet agreed-upon outputs and deliverables on time.
Legal Repercussions