Podcast
Questions and Answers
Some businesses and homeowners purchase Internet access from ______.
Some businesses and homeowners purchase Internet access from ______.
Internet service providers (ISPs)
Broadband is often referred to as ______ Internet.
Broadband is often referred to as ______ Internet.
high-speed
To access the Internet wirelessly at home, you need to establish ______ on your home network.
To access the Internet wirelessly at home, you need to establish ______ on your home network.
WiFi
Network-attached storage (NAS) devices are designed to store and manage ______ data.
Network-attached storage (NAS) devices are designed to store and manage ______ data.
The maximum range of Wi-Fi 4 or Wi-Fi 5 wireless devices is about ______ feet.
The maximum range of Wi-Fi 4 or Wi-Fi 5 wireless devices is about ______ feet.
A computer network is simply two or more computers that are connected via software and hardware so that they can communicate with each other. Each device connected to a network is referred to as a ______.
A computer network is simply two or more computers that are connected via software and hardware so that they can communicate with each other. Each device connected to a network is referred to as a ______.
One of the major disadvantages of networks is the setup ______.
One of the major disadvantages of networks is the setup ______.
A ______ area network (PAN) is used for communication among devices close to one person.
A ______ area network (PAN) is used for communication among devices close to one person.
Data transfer rate, also known as ______, is the maximum speed data can be transmitted through a network.
Data transfer rate, also known as ______, is the maximum speed data can be transmitted through a network.
A ______ area network (LAN) is a network in which the nodes are located within a small geographical area.
A ______ area network (LAN) is a network in which the nodes are located within a small geographical area.
When encryption or ransomware viruses infect a computer, they run a program that searches for types of data files and compresses them, requesting payment to receive the program to ______ your files.
When encryption or ransomware viruses infect a computer, they run a program that searches for types of data files and compresses them, requesting payment to receive the program to ______ your files.
A ______ virus changes its code to avoid detection.
A ______ virus changes its code to avoid detection.
A ______ virus is designed to infect multiple file types in an effort to fool antivirus software.
A ______ virus is designed to infect multiple file types in an effort to fool antivirus software.
Adware is software that displays ______ advertisements.
Adware is software that displays ______ advertisements.
Cookies are small text files that some websites automatically store on your hard drive when you ______ them.
Cookies are small text files that some websites automatically store on your hard drive when you ______ them.
Phishing lures Internet users to reveal ______ information.
Phishing lures Internet users to reveal ______ information.
Social engineering is any technique using social skills to generate human interaction with the purpose of luring individuals to reveal ______ information.
Social engineering is any technique using social skills to generate human interaction with the purpose of luring individuals to reveal ______ information.
A keylogger is a program that captures all ______ made on a computer.
A keylogger is a program that captures all ______ made on a computer.
A Trojan horse is a program that appears to be useful but does something ______ without your knowledge.
A Trojan horse is a program that appears to be useful but does something ______ without your knowledge.
A computer that a hacker controls is referred to as a ______.
A computer that a hacker controls is referred to as a ______.
In a denial-of-service attack, legitimate users are denied access to a system because a hacker is making ______ of that system.
In a denial-of-service attack, legitimate users are denied access to a system because a hacker is making ______ of that system.
A distributed denial-of-service (DDoS) attack launches DoS attacks from more than one ______ at the same time.
A distributed denial-of-service (DDoS) attack launches DoS attacks from more than one ______ at the same time.
A virus attaches to a computer program to spread to other ______.
A virus attaches to a computer program to spread to other ______.
A logic bomb is a virus triggered when certain ______ conditions are met.
A logic bomb is a virus triggered when certain ______ conditions are met.
E-mail viruses use the address book to distribute themselves to other ______.
E-mail viruses use the address book to distribute themselves to other ______.
Flashcards
Computer Network
Computer Network
Two or more computers connected via software and hardware to communicate.
Data transfer rate (bandwidth)
Data transfer rate (bandwidth)
The maximum speed data can be transferred over a network.
Throughput
Throughput
The actual speed data is transferred over a network.
Local Area Network (LAN)
Local Area Network (LAN)
Signup and view all the flashcards
Metropolitan Area Network (MAN)
Metropolitan Area Network (MAN)
Signup and view all the flashcards
Dial-up Internet access
Dial-up Internet access
Signup and view all the flashcards
Broadband Internet access
Broadband Internet access
Signup and view all the flashcards
WiFi
WiFi
Signup and view all the flashcards
Router
Router
Signup and view all the flashcards
Network-attached storage (NAS)
Network-attached storage (NAS)
Signup and view all the flashcards
Polymorphic Virus
Polymorphic Virus
Signup and view all the flashcards
Multipartite Virus
Multipartite Virus
Signup and view all the flashcards
Stealth Virus
Stealth Virus
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Keylogger
Keylogger
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Backdoor Program
Backdoor Program
Signup and view all the flashcards
Zombie
Zombie
Signup and view all the flashcards
Denial-of-Service Attack (DoS)
Denial-of-Service Attack (DoS)
Signup and view all the flashcards
Distributed Denial-of-Service Attack (DDoS)
Distributed Denial-of-Service Attack (DDoS)
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Exploit Kit
Exploit Kit
Signup and view all the flashcards
Study Notes
Technology in Action - Chapter 7: Networking: Connecting Computing Devices
- Chapter 7 covers networking, connecting computing devices.
- Learning objectives include describing computer networks, their pros and cons, different ways networks are defined, transmission media types, necessary hardware and software, broadband Internet access options, wireless Internet, home network setup, wireless home network problems, and solutions, and wireless home network security.
- A computer network connects two or more computers to communicate. Each device on a network is a node, which can be a computer, peripheral (like a printer), or network device (like a router).
- Networks offer benefits like sharing high-speed internet, printers, peripheral devices, and files, and enable common communication.
- A disadvantage of networks is setup time.
- Data transfer rate (bandwidth) is the maximum transmission speed. Throughput is the actual speed data is transferred. Measured in Mbps (megabits per second) or Gbps (gigabits per second).
- Networks can be classified by distance. Types include PANs, LANs, HANNs, MANs, and WANs.
- Networks can also be classified by levels of administration, such as client-server networks and peer-to-peer networks.
- In client-server networks, clients request services from a server. Peer-to-peer networks let each node communicate directly with every other node.
- Networks use protocols and transmission media (wireless or wired) to connect nodes. Wired networks use UTP, coaxial, or fiber-optic cables.
- Network components include network adapters (NICs), modems (translate signals), routers (transfer data between networks), and switches (manage data flow).
- Network software includes operating systems for P2P networking and client-server networks that use centralized servers for communication
- Essential elements for a functioning network include connection methods(cables or wireless), special hardware (allowing nodes to communicate) and software.
- Broadband internet connections are commonly used. They include cable internet, DSL, and fiber-optic service.
- Wireless internet access methods include mobile broadband, mobile hotspots, and wireless ISPs.
- Important considerations for home network setup include listing all devices, using the latest standards, and using the newest equipment
- Specialized home networking devices include NAS devices (network-attached storage), home network servers, and network-ready devices, designed to improve data management in a network.
- Troubleshooting wireless problems might involve placing access points where the signal is weak and using wireless range extenders.
- Securing wireless networks involves using encryption, changing network names(SSID), disabling SSID broadcast, changing default passwords, and creating passphrases. Additional methods include using media access controls, limiting signal range, keeping router firmware updated, and disabling remote access.
Technology in Action - Chapter 9: Securing Your System: Protecting Your Digital Data and Devices
- Cybercrime is criminal activity using computers, networks, and the internet (e.g., fraud, identity theft). Cybercriminals are individuals who perpetrate such crimes. Common types include FBI-related scams, identity theft, non-delivery/non-auction fraud, and advance-fee fraud.
- Identity theft occurs when a thief steals personal information to impersonate someone. Common scams include counterfeiting cards, changing addresses, opening new accounts, and obtaining medical/housing services.
- Hacking involves unauthorized access to computer systems. Types include white-hat (ethical), black-hat (illegal), and grey-hat. Tools include packet analyzers (sniffers) and keyloggers.
- Trojan horses are programs disguised as useful tools, but which have hidden malicious code
- Backdoors and rootkits allow unauthorized access to a computer.
- Denial-of-service (DoS) attacks flood a system with requests, preventing legitimate users from accessing it.
- Zombies are computers under a hacker's control, often used in DDoS (distributed DoS) attacks.
- Botnets are groups of zombie computers used to launch coordinated attacks.
- Exploit kits are software used to find and exploit vulnerabilities in servers.
- Viruses are programs that attach to other programs to spread to other computers. They aim to replicate, copy, and often damage host files.
- Viruses can be classified by techniques that avoid detection:
- Polymorphic: changes code
- Multi-partite: affects multiple files
- Stealth: erases code, hides in memory.
- Malware includes adware, spyware, and keystroke loggers that run with malicious intent.
- Adware shows sponsored advertisements.
- Spyware gathers information without user knowledge.
- Keystroke loggers monitor keystrokes.
- Spam is unwanted email or software. Spam filters help in reducing spam.
- Cookies are small text files that websites store on your hard drive; they can be used to track website traffic and personalize user experiences, but do not invade privacy unless exploited by others.
Technology in Action - Chapter 10: Behind the Scenes: Software Programming
- Programming tasks include complex tasks requiring creative thought and handling repetitive work with electronic information or clear steps to achieve automation.
- A career in programming offers plentiful jobs, strong salaries, and telecommuting opportunities. Programming is necessary when there's no existing software for a task.
- An Information System includes a collection of interacting parts (data, people, procedures, hardware, and software) that work together toward a common goal.
- Steps in the System Development Life Cycle (SDLC) include identifying the problem, analyzing the problem, designing a solution, developing the software, testing and installing, and maintaining the system.
- The stages of the program development life cycle (PDLC) involve defining the problem, developing the algorithm, converting the algorithm into code in a specific programming language, testing the program, and preparing documentation to explain the program to others.
- A programming language is a code used to tell the Central Processing Unit (CPU) what to do.
- Programming languages can be classified by generations (e.g., first-generation).
- Programming languages also use portability—the ability to move a program to another computer—and often use variables. Variables are used to tell the system how much space to allocate for inputs and outputs, and comments are used to describe the purpose of code portions.
- Compilation converts programs into machine code, and interpreters convert them into intermediate forms.
- Integrated Development Environments (IDEs) help programmers write and test programs.
- Debugging involves finding and fixing program errors.
Technology in Action - Chapter 11: Behind the Scenes: Databases and Information Systems
- Database advantages include efficient management of data, information sharing, and ensuring data accuracy and reliability.
- A database stores related data and can be queried (viewed) and manipulated.
- Flat databases organize data in a simple table format but can suffer from data redundancy, inconsistency, inappropriate data, and incomplete data. Relational databases organize data into related tables, connecting them through common fields (one-to-many, one-to-one, many-to-many).
- Database Management Systems (DBMS) are software which use keys like primary keys to uniquely identify records in related tables and foreign keys to link those records.
- Data validation ensures the data entered in the database is valid based on expectations established for that particular field.
- Viewing, sorting, and extracting data in a database can be done using queries, filters, or other tools, and data output can be a report or exported to other applications.
- Data warehousing and storage can track data to analyze trends (e.g. sales, customer demographics). Data mining uses techniques like anomaly detection, association grouping, classification, clustering, and visualization to identify patterns and insights in data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of computer networking fundamentals with this quiz. It covers essential concepts such as internet access, wireless networks, data storage, and network types. Perfect for beginners looking to enhance their knowledge of networking.