Test 3 Flashcards
(42 cards)
Monitoring of telephone and Internet-based conversations by a third party
Active wiretapping
Software that is designed to detect and recover from attacks by viruses and worms.
Antivirus software
The set of rules in a computer’s operating system for allocating the resources of the computer.
Arbitration rule
A resource measurement tool that indicates the likelihood that the resource will be ready when a user needs it. It is influenced by mean time between failures and mean time to repair.
Availability
A storage-saving and I/O-saving technique that groups individual records into a block that is stored and retrieved as a unit.
Blocking
Occurs when the capacity of an application or a computer system is limited by a single component.
Bottlenecks
A network architecture in which elements are connected together along a single link.
Bus Topology
A communication model in which a dedicated communication path is established between two hosts, and on which all messages travel.
Circuit Switching
The process of storing the same data in multiple locations to improve data availability and accessibility, and to improve system resilience and reliability.
Data replication
An operating system that provides global control for a distributed computing system allowing its resources to be managed in a unified way.
Distributed Operating System (DO/S)
A decision mode, a priority function, and an arbitration rule
DO/S system’s scheduling function
Its principal function is the resolution of Internet addresses based on fully qualified domain names, such as .com or .edu.
Domain Name Service (DNS)
People can find old tech thrown away and recover data off of it.
Dumpster Driving
The name of the program a user invokes to execute the File Transfer Protocol.
F T P command
A set of hardware and software that disguises the internal network address of a computer or network to control how clients from outside can access the organization’s internal servers.
Firewalls
A communications device or program that passes data between networks having similar functions but different protocols.
Gateway
Known as ISO (not an abbreviation), it is a voluntary, non-treaty organization that is responsible for creating international standards in many areas, including computers and communications.
International Organization for Standardization
Signal sent out when a collision occurs.
Jamming Signal
Authentication system that allows network managers to administer and manage user authentication at the network level.
Kerberos protocol
The part of the operating system that resides in main memory at all times and performs the most essential tasks, such as managing memory and handling disk input and output. It has complete control over everything that occurs in the system.
Kernel
A data network intended to serve an area covering only a few square kilometers or less. Like a house.
LAN
Backed up once a week and only backs up the files that were changed daily
Layered backup
A system of interconnected computer systems and peripheral devices that exchange information with one another.
Network
Refers to the processes, tools and applications used to administer, operate and maintain a network infrastructure.
Network Management