Software and Networking Flashcards

1
Q

Operating System (OS)

A

the underlying software that integrates the hardware with software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Libraries

A

individual programs are
designed to work cooperatively with each other

They are called upon by executables to perform specific tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executable

A

is a standalone file containing code that can be directly run by the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process

A

task performed by the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two most important roles of an OS?

A
  1. Ensuring the programs don’t interfere with one another (ex. memory usage)
  2. Maintaining security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Graphical User Interface (GUI)

A

Pronounced “Gooey”

replaces typed computer commands with a graphical representation of the task (e.g., moving a file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the OS on software platform?

A

The OS also provides a foundation or software platform for all other software
(application programs).

The operating system to a large
extent determines which application software can be used on a particular system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UNIX, Linux, DOS

A

examples of OS

Other more well-known options include Windows and macOS (Macintosh/Apple)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiprocessing OS

A

supports use of more than one CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multitasking OS

A

allows more than one program to run simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multithreading OS

A

allows different parts of a program to run concurrently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiuser OS

A

allows two or more individuals to run programs concurrently on the same computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Drivers

A

small programs that enable
the operating system and application
programs to interact with each other
and with peripheral hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the relationship between OS, application software, and computer hardware?

A

All application software runs on top of the OS; the OS, in
turn, exchanges data/instructions directly with the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application Software

A

is a program designed to do real work for a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Word processors, Internet Browsers, and PACS Viewers

A

Examples of application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Software Containers

A

Similar to VM’s, but rather than being an extraction of the hardware layer, Containers are an extraction of an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does an application container serve the system?

A

The application container allows specifc inputs to go in and specifc outputs to
come out. This provides for a very secure and stable environment/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Docker and Kubernetes

A

examples of Software Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Low-Level Programming Language

A

the software language that is directly
understood by a microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are two other names for Low-Level Programming Language?

A

machine code or machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can a low-level programming do for a CPU, in terms of processing?

A

It can teach it how to perform more complicated computations through a series of machine codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

High-Level Programming Language

A

an abstraction of machine code programming because it uses natural language elements instead of arcane numbers and
abbreviations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the benefit of High-Level programming language?

A

It makes the process of programming simpler, intuitive, and
more understandable to the human programmer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
C, BASIC, Python, JavaScript. Java, Go, R, PHP, and Swift
examples of High-Level Programming Language
26
Integrated Development Environment (IDE)
a toolset that facilitates programming by providing a workspace that makes coding more efficient
27
Compiling
the process of translating source code into machine code
28
Compiler
the software that converts the source code to machine code
29
What is the difference between Scripting Languages and compiled languages?
Scripting languages differ from compiled languages in that the source code is interpreted and converted into machine code at the time of execution – obviating the compiling process
30
JavaScript, VBScript, Python, and ASPX
examples of Scripting languages
31
Computer Network
a group of two or more interconnected computers that are capable of sharing data and resources
32
What is the benefit of computer networking?
Networking allows multiple independent users to share the same resources (i.e., applications and data) and work with this data simultaneously
33
How can computer networks be classified?
scale (i.e., size, complexity), scope, topology, architecture, and connection method
34
What is the most common network?
local area network (LAN)
35
LAN
Local Area Network A LAN is characterized by serving computers in a small geographic area such as a home or office
36
A network comprised of two or more LANs creates a..
wide area network (WAN)
37
What is the largest WAN?
the public Internet
38
Internetworking
Connection of two or more networks
39
Intranet
one or more networks that are under control of a single administrative authority
40
Extranet
an internally managed network (intranet) that maintains limited connectivity to networks that are neither managed, owned, nor controlled by the same entity These regulate access to the public internet
41
Virtual Private Network (VPN)
method for including a distant device into an intranet with nearly the same level of security as if it were on the premises
42
Network Interface Card (NIC)
the piece of computer hardware that provides the capability for a computer to communicate over a network
43
medium access control (MAC) address
A number can be used to help route data to and from other computers
44
Category 5 or Cat5
The physical connection of the computer to the network that is usually accomplished through specialized cabling that contains four pairs of simple copper wires (twisted pair)
45
What's the benefit to fiber optic cables and wireless as opposed to Cat5?
Fiber optic provides greater transmission capacity (bandwidth) than Cat5, wireless affords greater access where physical connections are not readily available
46
Ethernet
the wiring and signaling schema for the NIC and the cabling between devices on the network
47
Switches
the devices that connect other devices together on the network; it is an imprecise term that refers to many types of network devices
48
Network Hub
The simplest and most inexpensive of network switches
49
50
How does a network hub work?
Each computer network cable has an individual connection to the hub. only one computer can successfully transmit at a time each computer (host) is responsible for the entire communication process
51
What is the downside to using a network hub?
The hub does not have any capability to route messages to a specific destination. (The hub merely replicates all messages to all hosts connected to it)
52
Network Bridge
improves upon the design of the basic network hub by providing a level of active management of the communication between attached hosts
53
How does a network bridge improve upon the network hub design?
The bridge is capable of learning the MAC addresses of the connected host computers
54
What is the downfall of a Network Bridge?
the bridge needs to examine all data sent through it, it creates some processing overhead which slows the data transmission rate
55
Network Router
Similar to a network bridge, but the router is capable of discerning data based upon a software configurable identifier known as the Internet Protocol address (IP address)
56
Hostname
a human-readable unique label for a computer on a network
57
What is the relationship between a hostname and an IP address?
Every hostname has a unique IP address associated with it
58
Two types of IP addresses
1. Fixed (unchangeable) 2. Dynamic (modifiable, reusable)
59
What information does a network routing table provide?
defne the topology of a network, the relationship of devices on a network, and how to reach them
60
Do all computers have a unique IP address?
No, two internal networks can use the same IP subaddresses, as long as those computers are not exposed to the rest of the Internet
61
Subnetwork
small network of computers that is connected to a larger network through a router
62
What is the purpose of the DHCP, NAT, and network firewall featured within home networking broadband network router?
DHCP (dynamic hose configuration) NAT (network address translation) These provide a secure connection between the home LAN and the ISP WAN.
63
What does a DHCP do?
It is used to orchestrate how devices are automatically configured on a network individual devices “negotiate” with the network controller or router to establish a path for communication
64
What role does NAT play in a network?
serves as a proxy that allows multiple computers to share a single public Internet IP address. The broadband network router assigns each computer in the home network its own IP address that is only unique within the home network
65
What role does a firewall play in a network?
It is primarily a security device (hardware and software) that filters traffic between the network, adjacent networks (WAN or LAN), and public networks
66
IPS
internet protocol suite a type of network protocol over ethernet
67
TCP/IP
Transmission Control Protocol/Internet Protocol is a software abstraction of protocols and services necessary to establish communication between two computers on a network
68
Who regulates the TCP/IP and what is the name of this model?
International Organization for Standardization (ISO) ISO network model
69
As a result of the information layers in the ISO network model, how is a connection established between two computers?
Through a negotiation process which includes the request and acceptance of an initial connection, the type of transmission, data packet size, data acknowledgement, as well as when and how to transmit missing data
70
Data Packets
multiple small discrete chunks of information sent over a network
71
Collision
An instance where two or more computers attempt to send data along the same segment simultaneously
72
Data Frames
data packets with an additional data wrapper
73
Data Wrapper
Additional metadata attached to the Data Packet containing delivery information similar to that on a mailed envelope (Sender and return address)
74
How do data packets contribute towards efficiently sending information over a network?
By breaking up data into smaller "chunks" the information can be sent quickly over several routes as opposed to slower over one single route
75
What enables data packets to become reconfigured appropriately upon reaching their destination?
the ISO model
76
Network Bandwith
the rate at which information can be transmitted per second (bits/sec) through a network
77
What is the optimal relationship between bandwidth and latency?
High bandwidth and low latency
78
Latency
a network parameter that is often used to gauge performance of a connection
79
How does is latency measured?
By the time for a data packet to take a round trip from sender to receiver and back to the sender, it is expressed in milliseconds (ms)
80
What does the term broadband describe?
high-speed Internet access with a minimum of 25 Mbps download and 3 Mbps upload speed
81
What factors can cause actual achieved bandwidth to operate less effectively than theoretical bandwidth?
quality of cabling, efficiency of network switches, and firewall
82
Client-Server, Data Center, and Cloud Computing
All examples of network architecture used to store data
83
What are the three cloud computing services?
Saas, PaaS, and Iaas
84
Saas
Software as a service provides access to software that runs on client computers without installing the software locally
85
Google apps, Dropbox, DocuSign
Examples of SaaS
86
PaaS
Platform as a Service provides a development platform in the cloud to create applications, databases, and services as a replacement for local development servers in a data center
87
Google Cloud Platform (GCP) and Amazon Web Services (AWS)
Example of PaaS
88
IaaS
Infrastructure as a Service consists of infrastructure such as storage, networking, and virtualization services in the Cloud
89
Amazon Elastic Cloud Services (EC2)
Example of an IaaS
90
Fat Client
is a host application that performs the bulk of data processing operations for the user Relies minimally on the network resources
91
Client-Server Architecture
Describes the close interrelationship between multiple clients and a server
92
Web Application
Any application that is accessed via a web browser over a network that is coded in a browser supported language
93
Thin Client
an application that relies primarily on the server for processing focuses principally on conveying input and output between the user and the server
94
Hybrid client
Describes an application that utilizes a local installation of software, but still has tight interdependencies with servers
95
Web Services
Software applications that are designed to operate principally over a network in a client-server configuration
96
How do web services differ from web applications?
web services do NOT need to run inside of a browser or be constructed with web elements.
97
Who designs the mutually agreed upon protocol relied on by servers and clients to exchange information?
the Internet Engineering Task Force and the World Wide Web Consortium (W3C)
98
What is the most common protocol used to exchange information over the internet and in web browsers?
Hypertext Transfer Protocol (HTTP)
99
What is the most common protocol used to exchange information over email?
Simple Mail Transfer Protocol (SMTP)
100
What is the most common protocol used to exchange structured information over PACS?
Simple Object Access Protocol (SOAP)
101
SQL
Structured Query Language a database-specific computer language designed to retrieve and manage data in relational database management systems (RDMS)
102