Podcast
Questions and Answers
What is a computer network and what are its basic components?
What is a computer network and what are its basic components?
A computer network is two or more computers connected via software and hardware to communicate. The basic components include nodes such as computers, peripherals, and network devices like routers.
List two advantages and one disadvantage of having a computer network.
List two advantages and one disadvantage of having a computer network.
Advantages include sharing an Internet connection and sharing printers or files. A disadvantage is the setup time required.
Define bandwidth and throughput in the context of computer networks.
Define bandwidth and throughput in the context of computer networks.
Bandwidth is the maximum speed at which data can be transmitted, while throughput is the actual speed at which data is transferred.
What is the difference between a LAN and a PAN?
What is the difference between a LAN and a PAN?
Signup and view all the answers
What considerations should be made before creating a home network?
What considerations should be made before creating a home network?
Signup and view all the answers
What distinguishes a client/server network from a peer-to-peer network?
What distinguishes a client/server network from a peer-to-peer network?
Signup and view all the answers
What is meant by backward compatibility in networking?
What is meant by backward compatibility in networking?
Signup and view all the answers
What are the three types of wired transmission media mentioned?
What are the three types of wired transmission media mentioned?
Signup and view all the answers
What is the role of a router in a network?
What is the role of a router in a network?
Signup and view all the answers
Why do home networks often use peer-to-peer (P2P) networking?
Why do home networks often use peer-to-peer (P2P) networking?
Signup and view all the answers
What type of software do servers in client/server networks require?
What type of software do servers in client/server networks require?
Signup and view all the answers
What is one of the main reasons for setting up a network?
What is one of the main reasons for setting up a network?
Signup and view all the answers
What is the primary purpose of ransomware viruses?
What is the primary purpose of ransomware viruses?
Signup and view all the answers
How does a polymorphic virus avoid detection?
How does a polymorphic virus avoid detection?
Signup and view all the answers
What type of software is classified as malware?
What type of software is classified as malware?
Signup and view all the answers
What is adware designed to do?
What is adware designed to do?
Signup and view all the answers
What is the main function of a spam filter?
What is the main function of a spam filter?
Signup and view all the answers
Why are cookies used by websites?
Why are cookies used by websites?
Signup and view all the answers
What is social engineering in the context of computer security?
What is social engineering in the context of computer security?
Signup and view all the answers
What precaution should you take to avoid phishing attacks?
What precaution should you take to avoid phishing attacks?
Signup and view all the answers
What is the difference between phishing and pharming?
What is the difference between phishing and pharming?
Signup and view all the answers
What is scareware and how does it exploit users?
What is scareware and how does it exploit users?
Signup and view all the answers
What is the purpose of a firewall?
What is the purpose of a firewall?
Signup and view all the answers
Name two companies that provide antivirus software.
Name two companies that provide antivirus software.
Signup and view all the answers
What is a virus signature?
What is a virus signature?
Signup and view all the answers
How do drive-by downloads exploit operating system weaknesses?
How do drive-by downloads exploit operating system weaknesses?
Signup and view all the answers
What are the characteristics of a strong password?
What are the characteristics of a strong password?
Signup and view all the answers
What is the function of quarantining a virus?
What is the function of quarantining a virus?
Signup and view all the answers
What is the role of packet filtering in a firewall?
What is the role of packet filtering in a firewall?
Signup and view all the answers
What does a biometric authentication device measure?
What does a biometric authentication device measure?
Signup and view all the answers
Study Notes
Technology in Action - Chapter 7
- Chapter 7 is about networking and connecting computing devices.
- Learning objectives include describing computer networks and their pros and cons, explaining different network definitions, describing transmission media types, identifying basic network hardware, outlining network software, and summarizing broadband Internet access options.
- A computer network connects two or more computers via software and hardware for communication.
- A node is a device connected to a network. A node can be a computer, peripheral, or network device, such as a router.
- Network benefits include sharing high-speed Internet connections, printers, peripheral devices, and files. Common communications are another benefit.
- The major disadvantage of networks is the setup time.
- Data transfer rate (bandwidth) is the maximum speed data travels.
- Throughput is the actual speed data transfers.
- Bandwidth and throughput are measured in Mbps (megabits per second) or Gbps (gigabits per second).
- Networks are classified by distance: personal area network (PAN), local area network (LAN), home area network (HAN), metropolitan area network (MAN), and wide area network (WAN).
- Networks are also classified by levels of administration: client/server networks and peer-to-peer (P2P) networks.
- In a client/server network, a client computer requests resources from a server.
- A peer-to-peer (P2P) network has nodes that communicate directly with each other.
- Networks use protocols like Ethernet, developed by IEEE. The methods used by computers to communicate include wired networks (Wi-Fi, gigabit Ethernet [GbE]) and wired networks.
- Networks require transmission media (cables or wireless technology) and special hardware for node communication.
- Software enables network operation. Network adapters, network interface cards (NICs), modems, routers, and switches are essential network hardware. A modem turns digital signals into analog (and vice versa) for broadband connections.
- Routers transfer data packets between networks, and switches route data within a network like traffic signals.
- Network software, such as operating systems, is crucial for network operation and communication. Home networks are peer-to-peer (P2P) networks.
- Client/server networks rely on centralized servers for communication.
- Broadband Internet access, such as cable Internet, DSL, and fiber-optic service, is preferred to dial-up or cellular access.
Technology in Action - Chapter 9
- Chapter 9 discusses securing digital data and devices.
- Cybercrime is any criminal act primarily using a computer or network.
- Cybercriminals perpetrate crimes through computers and networks. Four typical types of complaints are: FBI-related scams, identity theft, non-delivery/non-auction of merchandise, and advance-fee fraud. Other problems include hacking, child pornography, and blackmail.
- Identity theft occurs when a criminal steals personal information. Identity theft includes behaviors like counterfeiting credit/debit cards creating new credit card accounts, changing addresses, getting medical services, and buying or reselling items in someone else's name.
- Hacking is breaking into a computer system.
- Hackers can be white-hat (ethical), black-hat. grey-hat, and include packet analyzers (sniffers) and keyloggers. -White-hat hackers use methods that assist in testing system security. Black-hat hackers break into systems to harm or illegally gain profits. Grey-hat hackers break into systems for their own expertise.
- Packet analyzers intercept data packets sent across a network. Keyloggers record every keystroke on a computer. Trojan horses are malicious code disguised as useful programs. Backdoor programs and rootkits allow access to a computer without the user's knowledge.
- Zombies are computers controlled by hackers. Denial-of-service attacks use zombie computers to overwhelm target systems to stop operation. A botnet is a network of zombie computers
- Exploits are pieces of software used to find vulnerabilities in computer programs to access or control them from other points.
- Computer Viruses are programs that attach to other programs and copy themselves into host files (to spread rapidly). Secondary objectives of viruses can range from displaying annoying messages to destroying data on the whole computer.
- Virus types include boot-sector, logic, time bombs, worms, script/macro, email and encryption viruses.
- Virus detection methods include polymorphic viruses (code changes periodically), multi-partite viruses (affect multiple file types), and stealth viruses (erase code and hide themselves).
- Online annoyances include malware, adware, and spyware. Malware has a malicious intent; adware uses sponsored advertisements and spyware uses unwanted software downloads that runs in the background. Scareware attempts to convince victims something is wrong, luring them to pay to fix it.
- Spam is unwanted e-mail that uses various tactics to minimize spam.
- Cookies are small text files that help websites track behaviors on their website to improve performance.
- Social engineering tricks people into revealing sensitive information, through fake scenarios. Phishing involves tricking people into giving information, phishing schemes frequently use email, while pharming utilizes code on a computer.
Technology in Action - Chapter 10
- Chapter 10 is about software programming, the processes of translating an algorithm into CPU-readable instructions, and related aspects of designing and testing these software systems.
- Programming translates tasks into instructions that computers can process. Complex tasks require creative thought and human touch. Simple, but repetitive, tasks and tasks dealing with electronic information are well-suited for automated processing.
- A career in software programming offers plentiful jobs, strong salaries, and opportunities for telework.
- Programming is necessary to manage situations where current software does not exist or when a program needs to be created to work with existing software.
- A programming language converts algorithms into computer-understandable instructions (1s and 0s).
- The process of turning an algorithm into a programming language is called coding.
- An algorithm is a series of steps for task completion. Algorithms use flowcharts, which use symbols to pictorially depict steps, decisions, and repetition to illustrate order of operations. Algorithms can use decision points, binary decisions to select one path of operation or another, and loops.
- Top-down design breaks problems into simpler tasks. Object-oriented programming (OOP) analysis uses classes: base classes which define characteristics, and derived classes to build upon base classes, providing functionality and reusability
- Compilation turns programming code into machine language, and interpreters translate the code line by line. Integrated Development Environments (IDEs) help programmers write and test code.
- Debugging is fixing errors in programs. Logic errors (program runs but not correctly) and runtime errors (errors when the program runs) are two types of errors that require fixing.
- Testing involves internal checks of a program by the people who design it; external testing sees how the program is used by others; and releasing the product to manufacturers (RTM).
- Different programming languages serve different purposes, and appropriate selection relies on factors such as available resources, speed requirements, and the target application. Visual programming languages use graphical components to create the program.
Technology in Action - Chapter 11
- Chapter 11 focuses on information systems and databases.
- A database is a collection of related data that is stored, sorted, and organized. Advantages include efficient data management, sharing information, and ensuring data integrity (accuracy). Data integrity is crucial for accurate and reliable data in the database. -Relational Databases organize data into tables, linking related data. Relationships between tables include one-to-many, one-to-one, and many-to-many.
- A Database Management System (DBMS) is software that allows a computer to function as a database. It performs operations such as storing, viewing, adding, deleting, modifying, querying, and outputting data.
- Data in a DBMS is stored in fields, records, and tables. Fields are categories of data, records are related groups of fields, and tables are groups of related records. Different field data-types include Short Text, Long Text, Numbers, Large Numbers, Currency, Dates/Times, Yes/No, Calculated fields, OLE Objects, and Hyperlinks.
- Field properties define field data such as field size limits, default values, and labels for fields.
- Data validation ensures only correct data is entered into the database using techniques such as Range Check, Field Constraint, Completeness Check, Consistency Check, an Alphabetic/Numeric Check.
- Viewing and sorting data gives users options for ascending or descending order.
- Extraction data using filtering and querying returns matching records from databases.
- Outputting information involves reports. Transferring data into other programs is another form of outputting database data. Data warehousing stores and analyzes data to find patterns. Data mining is a method that is used to analyze data to identify trends and patterns. The goal is to help businesses predict customer behavior. Data mining uses anomaly detection, association grouping, classification, clustering, estimation, and visualization methods to process data
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores fundamental concepts of computer networks, including their components, advantages, and disadvantages. It covers terms like bandwidth, types of networks, and the functionality of various networking equipment. Additionally, it touches on network security aspects such as malware and spam filtering.