Computer Networking and Programming Concepts
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Broadband is often referred to as low-speed Internet.

False

Satellite Internet is mostly used in urban areas.

False

A network-attached storage (NAS) device allows for centralized data storage and access.

True

Wi-Fi 4 or Wi-Fi 5 wireless devices have a maximum range of about 150 feet.

<p>False</p> Signup and view all the answers

All devices on a home network should use the latest Ethernet standard for the best efficiency.

<p>True</p> Signup and view all the answers

Mobile broadband connects you to the Internet through 3G or 4G access.

<p>False</p> Signup and view all the answers

An Internet connectivity plan is commonly referred to as a data plan.

<p>True</p> Signup and view all the answers

An algorithm is a visual representation of patterns that describes what a program must do.

<p>False</p> Signup and view all the answers

Top-down design involves breaking a problem into high-level tasks and further refining those into subtasks.

<p>True</p> Signup and view all the answers

Error handling is the process of converting inputs into proper outputs.

<p>False</p> Signup and view all the answers

In object-oriented analysis, classes refer to the categories of inputs the program is meant to solve.

<p>True</p> Signup and view all the answers

Binary decisions can be answered with multiple choices beyond just yes or no.

<p>False</p> Signup and view all the answers

A keylogger is a program that captures all mouse movements on a computer.

<p>False</p> Signup and view all the answers

A Trojan horse is a program that appears harmless but performs malicious actions in the background.

<p>True</p> Signup and view all the answers

A computer controlled by a hacker is called a guardian.

<p>False</p> Signup and view all the answers

In a denial-of-service (DoS) attack, legitimate users are denied access to a system due to overwhelming requests.

<p>True</p> Signup and view all the answers

A distributed denial-of-service (DDoS) attack comes from a single compromised computer.

<p>False</p> Signup and view all the answers

Exploit kits are designed to fix vulnerabilities in software.

<p>False</p> Signup and view all the answers

A virus primarily aims to replicate itself and spread to other hosts.

<p>True</p> Signup and view all the answers

Boot-sector viruses attach themselves to the master boot record of a hard drive.

<p>True</p> Signup and view all the answers

Worms are dependent on host files to spread and execute.

<p>False</p> Signup and view all the answers

E-mail viruses can use the victim's address book for distribution.

<p>True</p> Signup and view all the answers

Walls and large metal objects are common sources of interference with wireless signals.

<p>True</p> Signup and view all the answers

Changing the SSID is one method for securing a wireless network.

<p>True</p> Signup and view all the answers

Black-hat hackers are known for securing systems against vulnerabilities.

<p>False</p> Signup and view all the answers

Identity theft is considered the least financially damaging cybercrime for individuals.

<p>False</p> Signup and view all the answers

A packet analyzer is used by hackers to monitor data packets traveling over the Internet.

<p>True</p> Signup and view all the answers

Limit signal range is one method mentioned for enhancing wireless network security.

<p>True</p> Signup and view all the answers

Cybercrime encompasses actions that are not primarily conducted through the use of computers.

<p>False</p> Signup and view all the answers

Grey-hat hackers break into systems for malicious purposes only.

<p>False</p> Signup and view all the answers

Keeping router firmware up to date is not a recommended method for securing wireless networks.

<p>False</p> Signup and view all the answers

Scareware is a type of malware that aims to make you believe your computer is infected with a virus.

<p>True</p> Signup and view all the answers

Firewalls are only hardware devices designed to protect computers from hackers.

<p>False</p> Signup and view all the answers

Antivirus protection is usually included in comprehensive internet security packages.

<p>True</p> Signup and view all the answers

A virus signature is a unique code that identifies a particular computer virus.

<p>True</p> Signup and view all the answers

Drive-by downloads affect approximately 1 in 10 web pages.

<p>False</p> Signup and view all the answers

Strong passwords should be at least twelve characters long and include a mix of uppercase, lowercase, numeric, and symbol characters.

<p>False</p> Signup and view all the answers

Biometric authentication devices utilize personal characteristics such as fingerprints or iris patterns for authentication.

<p>True</p> Signup and view all the answers

Quarantining a virus involves deleting it immediately from the computer.

<p>False</p> Signup and view all the answers

Windows Firewall shows visual indications of its status to the user.

<p>True</p> Signup and view all the answers

Antivirus software is exclusively designed to protect computers from malware other than viruses.

<p>False</p> Signup and view all the answers

Study Notes

Chapter 7: Networking: Connecting Computing Devices

  • Networking connects two or more computers to communicate
  • Each device on a network is called a node
  • Nodes can be computers, peripherals (printers, game consoles), or network devices (routers)
  • Networks offer benefits like shared internet, printers, files, and communication, but setup can take time

Learning Objectives

  • Describe computer networks and their advantages/disadvantages
  • Explain network classifications by distance (PAN, LAN, HAN, MAN, WAN) and administration (client/server, peer-to-peer)
  • Describe network transmission media (wireless, wired; e.g., UTP, coaxial, fiber-optic cables)
  • Describe basic network hardware (network adapter, NIC, modem, router, switch)
  • Describe the software necessary for networks (operating systems, specialized network operating systems)
  • Summarize internet access methods (broadband, cellular, dial-up)

Networking Fundamentals

  • Computer networks connect multiple computers to share resources
  • A node is any device connected to a network
  • Networks can share internet connections, printers, and files

Data Transfer in Networks

  • Bandwidth is the maximum data transfer rate
  • Throughput is the actual data transfer rate
  • Units used to measure data transfer rates are Mbps (megabits per second) and Gbps (gigabits per second)

Network Architectures

  • Networks are classified by distance:
    • Personal Area Network (PAN)
    • Local Area Network (LAN)
    • Home Area Network (HAN)
    • Metropolitan Area Network (MAN)
    • Wide Area Network (WAN)
  • Networks are also classified by administrative level:
    • Client/server network
    • Peer-to-peer (P2P) network

Network Components (Hardware)

  • A node needs a network adapter (NIC)
  • A modem translates signals for broadband connections
  • Routers transfer data between networks
  • Switches manage traffic within a network

Network Components (Software)

  • Operating systems for P2P networks
  • Client/server networks use specialized network operating systems (NOS)

Connecting to the Internet

  • Broadband internet is most preferred
  • Internet service providers (ISPs) provide internet access

Broadband Internet Connections

  • Cable Internet
  • DSL (digital subscriber line)
  • Fiber-optic service

Connecting to the Internet (Wireless)

  • Mobile broadband
  • Mobile hotspots
  • Wireless Internet service providers (ISPs)
  • Data plans are needed for wireless internet access

Installing and Configuring Home Networks

  • List all devices being used
  • Use the latest network standards for best experience
  • Consider having ISP provide newer router

Network Components

  • Networks require a means of connecting nodes (e.g., cables or wireless technology)
  • Special hardware allows nodes to communicate and send data
  • Software runs networks

Transmission Media

  • Transmission media establishes communication between network nodes
  • Media can be wireless or wired

Wired Networks

  • UTP cable: twisted copper wires surrounded by plastic
  • Coaxial cable: single copper wire surrounded by plastic layers
  • Fiber-optic cable: plastic or glass fibers

Network Components (Hardware)

  • Network adapters (NIC)
  • Modems
  • Routers
  • Switches

Network Components (Software)

  • Operating systems for P2P networks and client-server networks

Securing Wireless Networks

  • Use encryption and security protocols
  • Change network name (SSID)
  • Disable SSID broadcast
  • Change default passwords
  • Create strong passphrases
  • Implement media access control
  • Limit signal range
  • Keep router firmware up to date
  • Disable remote access

Identity Theft and Hackers

  • Cybercrime: Criminal actions using computers, networks, and the internet.
    • Cybercriminals: Individuals who perform these crimes.
    • Common types: FBI-related scams, identity theft, non-delivery of merchandise, and advance fee fraud.
  • Identity Theft: Criminals steal personal information to impersonate someone
  • Scareware: Malicious software designed to scare users into paying for fake virus removal
  • Hackers: Individuals who break into computer systems
    • White-hat hackers: Ethical hackers who find vulnerabilities
    • Black-hat hackers: Break into systems for illegal gain
    • Grey-hat hackers: Break into systems to demonstrate skill or to repair breaches
  • Zombies: Hackers' controlled computers
  • Botnets: Large groups of zombie computers
  • Trojan Horses: Malicious programs disguised as legitimate applications
  • Exploit kits: Software that searches for vulnerabilities in servers

Computer Viruses

  • Independent programs that run on computers
  • Main goal: Replicate and spread through other files
  • Can have secondary goals, like display annoying messages or delete files
  • Classified by methods used to avoid detection
    • Polymorphic viruses: Constantly change their code
    • Multi-partite viruses: Infect multiple file types
    • Stealth viruses: Hide by temporarily erasing their code

Online Annoyances

  • Malware: Software with malicious intent
  • Adware: Displays advertisements
  • Spyware: Downloads with other software, tracks activities
  • Keystroke logger: Records keystrokes
  • Spam: Unwanted email
  • Cookies: Small text files placed on hard drives when visiting websites

Social Engineering

  • Social engineering: Using social skills to convince someone to reveal information
  • Pretexting: Creating fake scenarios to trick people into revealing information
  • Phishing: Luring people into revealing information by posing as a trustworthy entity (e.g., bank)
  • Pharming: Planting malicious code on a computer to gather information

Restricting Access to Your Digital Assets

  • Firewalls: Software and hardware to protect computers from hackers
  • Antivirus software: Detects viruses and protects systems (e.g., Symantec, Trend Micro, Avast)
  • Virus signatures: Specific portion of virus code for identification
  • Quarantining: Isolating infected files
  • Inoculation: Recording and storing data about computer files
  • Drive-by downloads: Exploiting operating system weaknesses to infect computers

Authentication: Passwords and Biometrics

  • Strong passwords are necessary to prevent unauthorized access to systems
  • Biometric authentication uses unique personal characteristics such as fingerprints or facial recognition

Chapter 10: Behind the Scenes: Software Programming

  • Tasks can be complex or repetitive, ideal for automation through programming
  • Programming translates a task into commands that a computer executes

Life Cycle of a Program

  • Problem statement: Defines tasks, goals, uses, data, and method
  • Algorithm development: Steps to solve the problem, using flowcharts and pseudocode
  • Coding: Translating an algorithm into a specific programming language, using an Integrated Development Environment (IDE)
  • Debugging: Identifying and fixing errors in a program
  • Testing and Documentation: Testing the program thoroughly and documenting it for maintenance
  • General Availability: Making the program publicly accessible

Many Programming Languages

  • Diverse languages exist to match diverse industries and tasks, like in financial services or manufacturing
  • Language selection depends on available resources, needed speed, organizational structure, and application tasks

Chapter 11: Behind the Scenes: Databases and Information Systems

  • Databases: Collections of related data that can be stored, sorted, organized, and queried
  • Database advantages: Manage large amounts of data efficiently, share information, and promote data integrity
  • Flat databases: Represented as lists or tables
  • Relational databases: Organize data into tables, linking via common fields (relationships, primary/foreign keys)
  • DBMS (Database Management System): Software running a database

Using Databases

  • Data types: Different data types for storage (e.g., Short Text, Numbers, Currency)
  • Field properties: Define data characteristics (e.g., size, default value, caption)
  • Input forms: Control how new data is entered
  • Data validation: Ensures data meets specific criteria
  • Viewing and Sorting Data: Display and reorder data
  • Extracting/Querying Data: Retrieve specific data
  • Outputting Data: Display or transfer data to other applications

Data Warehousing and Storage

  • Data mining: Analyzing and investigating data to identify patterns and trends
  • Data mining techniques: Anomaly detection, association/affinity grouping, classification, clustering, estimation, visualization

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Computer Networks PDF

Description

This quiz covers essential topics in computer networking and programming, including types of Internet connections, data storage solutions, and fundamental programming principles. Test your knowledge on concepts like broadband, algorithms, and error handling. Perfect for students in computer science or information technology courses.

More Like This

Computer Studies Overview
12 questions
Computer Networking Overview Course Quiz
20 questions
Distributed Programming Concepts
45 questions
Use Quizgecko on...
Browser
Browser