Intro to CS Rutgers Exam 1 Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does 'Upload' mean?

  • To transfer data from a large computer to a smaller computer
  • To delete data from a device
  • To retrieve data from a server
  • To transfer data from a smaller computer to a larger computer (correct)

What does 'Download' mean?

  • Both A and B (correct)
  • To transfer data from a larger to a smaller computer
  • To send data to external storage
  • To transfer data from a distant to a nearby computer

What is a router?

A piece of hardware or software having a specific IP address connected to network nodes for data transfer between computers.

What is a modem?

<p>An electronic device that enables transmission of data to or from a computer via telephone or other communication lines.</p> Signup and view all the answers

What is a host?

<p>A computer system that is accessed by a user working at a remote location.</p> Signup and view all the answers

What is a client?

<p>An application that runs on a personal computer or workstation and relies on a server for operations.</p> Signup and view all the answers

What are nodes in a network?

<p>Processing locations that can be a computer or other devices like printers.</p> Signup and view all the answers

What is a server?

<p>A computer or device on a network that manages network resources.</p> Signup and view all the answers

What is a network interface card (NIC)?

<p>An expansion board you insert into a computer to connect to a network.</p> Signup and view all the answers

What is network topology?

<p>The shape of the local-area network (LAN) or communications system, which can be either physical or logical.</p> Signup and view all the answers

What is a protocol in networking?

<p>An agreed-upon format for transmitting data between two devices.</p> Signup and view all the answers

What does LAN stand for?

<p>Local-area network.</p> Signup and view all the answers

What does WAN stand for?

<p>Wide-area network.</p> Signup and view all the answers

What does MAN stand for?

<p>Metropolitan-area network.</p> Signup and view all the answers

What is FTP?

<p>File transfer protocol.</p> Signup and view all the answers

What are packets in networking?

<p>Pieces of a message transmitted over a packet switching network.</p> Signup and view all the answers

What is circuit switching?

<p>A type of communication where a dedicated channel is established for the duration of a transmission.</p> Signup and view all the answers

What is packet switching?

<p>A protocol where messages are divided before sending, with each transmitted individually.</p> Signup and view all the answers

What is asynchronous transmission?

<p>Communications where data is transmitted intermittently rather than as a steady stream.</p> Signup and view all the answers

What is synchronous transmission?

<p>Communication where data occurs at regular intervals.</p> Signup and view all the answers

What does BPS stand for?

<p>Bits per second.</p> Signup and view all the answers

What is bandwidth?

<p>The amount of data that can be transmitted in a fixed amount of time.</p> Signup and view all the answers

What is latency?

<p>The period of time that one component in a system is waiting for another component.</p> Signup and view all the answers

What is a peer-to-peer network?

<p>A type of network where each workstation has equivalent capabilities and responsibilities.</p> Signup and view all the answers

What is a client-server network?

<p>A network where one centralized computer (server) connects to multiple less powerful computers (clients).</p> Signup and view all the answers

What are wireless networks?

<p>Networks that use wireless data connections for connecting nodes.</p> Signup and view all the answers

What is Bluetooth?

<p>A short-range radio technology aimed at simplifying communications between devices.</p> Signup and view all the answers

What is a hotspot?

<p>A specific geographic location providing public wireless broadband network services.</p> Signup and view all the answers

What is the Internet?

<p>A global network connecting millions of computers.</p> Signup and view all the answers

What does WWW stand for?

<p>World Wide Web.</p> Signup and view all the answers

What is a static IP address?

<p>An IP address that does not change.</p> Signup and view all the answers

What is a dynamic IP address?

<p>An IP address that changes over time.</p> Signup and view all the answers

What are IPv6 and IPv4?

<p>Communications protocols for identifying and locating computers on networks; IPv6 is intended to replace IPv4.</p> Signup and view all the answers

What is TCP/IP?

<p>Transmission Control Protocol / Internet Protocol.</p> Signup and view all the answers

What does HTML stand for?

<p>Hypertext Markup Language.</p> Signup and view all the answers

What is the IEEE?

<p>An organization composed of engineers, scientists, and students.</p> Signup and view all the answers

What are cookies in web technology?

<p>Messages given to the web browser by the web server, which are stored in a text file.</p> Signup and view all the answers

What is broadband?

<p>Data transmission where a single medium carries multiple channels at once.</p> Signup and view all the answers

What is DSL/Cable?

<p>Digital Subscriber Line, a high-speed internet connection method using telephone lines.</p> Signup and view all the answers

What is a browser?

<p>A software application used to locate, retrieve, and display content on the World Wide Web.</p> Signup and view all the answers

What is a search engine?

<p>Programs that search documents for specified keywords and return lists of matching documents.</p> Signup and view all the answers

What does IMAP stand for?

<p>Internet Message Access Protocol.</p> Signup and view all the answers

What does VOIP stand for?

<p>Voice Over Internet Protocol.</p> Signup and view all the answers

What does DNS stand for?

<p>Domain Name System.</p> Signup and view all the answers

What does SMTP stand for?

<p>Simple Mail Transfer Protocol.</p> Signup and view all the answers

What is IETF?

<p>Internet Engineering Task Force.</p> Signup and view all the answers

What does SSL/TLS stand for?

<p>Secure Sockets Layer / Transport Layer Security.</p> Signup and view all the answers

What are web crawlers (or spiders)?

<p>Programs that automatically fetch web pages to feed them to search engines.</p> Signup and view all the answers

What is a meta tag?

<p>A special HTML tag that provides information about a web page.</p> Signup and view all the answers

What is a mash-up in cybersecurity?

<p>A new breed of web-based applications mixing at least two different services to enhance security.</p> Signup and view all the answers

What is an ISP?

<p>Internet Service Provider.</p> Signup and view all the answers

What does URL stand for?

<p>Uniform Resource Locator.</p> Signup and view all the answers

What is phishing?

<p>An email that falsely claims to be a legitimate enterprise to scam the user into surrendering private information.</p> Signup and view all the answers

What is spoofing?

<p>Describes ways hardware and software can be fooled.</p> Signup and view all the answers

What is pharming?

<p>A method to obtain personal or private information through domain spoofing.</p> Signup and view all the answers

What is spam?

<p>Electronic junk mail or junk postings in newsgroups.</p> Signup and view all the answers

What is privacy in computing?

<p>The security level of personal data published via the internet.</p> Signup and view all the answers

What is a virus?

<p>A program or piece of code loaded onto your computer without your knowledge, running against your wishes.</p> Signup and view all the answers

What is a worm?

<p>A program or algorithm that replicates itself over a network and usually performs malicious actions.</p> Signup and view all the answers

What is a trojan horse?

<p>A destructive program masquerading as a benign application.</p> Signup and view all the answers

What are botnets/zombies?

<p>Computers implanted with daemons controlled by a malicious hacker without the owner's knowledge.</p> Signup and view all the answers

What is spyware?

<p>Software that gathers user information covertly through the internet connection.</p> Signup and view all the answers

What does HTTPS stand for?

<p>Hypertext Transfer Protocol Secure.</p> Signup and view all the answers

What is adware?

<p>Software that contains embedded advertisements.</p> Signup and view all the answers

What is a web bug?

<p>An object embedded in a web page or email that allows checking user access.</p> Signup and view all the answers

What is SFTP?

<p>Secure File Transfer Protocol, a method for transferring files securely over a data stream.</p> Signup and view all the answers

What is encryption?

<p>The translation of data into a secret code.</p> Signup and view all the answers

What is PGP?

<p>Pretty Good Privacy, a technique for encrypting messages.</p> Signup and view all the answers

What is public key encryption?

<p>A cryptographic system using a public key for encryption and a private key for decryption.</p> Signup and view all the answers

What is symmetric encryption?

<p>A type of encryption where the same key is used for both encryption and decryption.</p> Signup and view all the answers

What is cryptography?

<p>The art of protecting information by transforming it into cipher text.</p> Signup and view all the answers

What is a cipher?

<p>Encrypted data that is unreadable until decrypted with a key.</p> Signup and view all the answers

What is Caesar's cipher?

<p>A simple substitution cipher shifting letters in the alphabet.</p> Signup and view all the answers

What is a digital signature?

<p>A digital code attached to an electronically transmitted message to identify the sender.</p> Signup and view all the answers

What is a firewall?

<p>A system designed to prevent unauthorized access to or from a network.</p> Signup and view all the answers

What is cyberstalking?

<p>The repeated use of electronic communications to harass or frighten someone.</p> Signup and view all the answers

What is TOR?

<p>An anonymous internet communication system based on a distributed network.</p> Signup and view all the answers

What is WikiLeaks?

<p>A multinational media organization that publishes large datasets of censored materials.</p> Signup and view all the answers

What is Snapchat?

<p>A mobile app allowing users to send self-destructing videos and pictures.</p> Signup and view all the answers

What is CyberDust?

<p>An application that combines the ease of text messaging with the privacy of phone calls.</p> Signup and view all the answers

What is a denial of service attack (DDoS)?

<p>An attempt to make a machine or network resource unavailable to users.</p> Signup and view all the answers

What are Google Glass?

<p>An optical head-mounted display designed like eyeglasses.</p> Signup and view all the answers

What is steganography?

<p>The art of hiding information by embedding messages within other messages.</p> Signup and view all the answers

What is cyberbullying?

<p>Online harassment through electronic communications.</p> Signup and view all the answers

What is a VPN?

<p>A network constructed using public wires to connect to a private network.</p> Signup and view all the answers

What is a biometric identifier?

<p>Distinctive, measurable characteristics used to label and describe individuals.</p> Signup and view all the answers

What is application software?

<p>Programs designed for end users, like word processors and web browsers.</p> Signup and view all the answers

What is abstraction in computing?

<p>The process of picking out common features of objects and procedures.</p> Signup and view all the answers

What is binary representation of data?

<p>A format for data representation using strings of 0 and 1.</p> Signup and view all the answers

What is octal?

<p>A base-8 number system using symbols 0-7.</p> Signup and view all the answers

What is hexadecimal?

<p>A base-16 number system using symbols 0-9 and A-F.</p> Signup and view all the answers

What is hardware?

<p>Physical objects that you can touch, like disks and keyboards.</p> Signup and view all the answers

What is software?

<p>Computer instructions or data stored electronically.</p> Signup and view all the answers

What is TRIM in SSDs?

<p>Allows the operating system to inform an SSD about unused blocks that can be wiped.</p> Signup and view all the answers

What does RFID stand for?

<p>Radio Frequency Identification.</p> Signup and view all the answers

What is a bit?

<p>Binary digit; the smallest unit of information on a machine, holding values of 0 or 1.</p> Signup and view all the answers

What is a byte?

<p>A unit of storage capable of holding a single character, equal to 8 bits.</p> Signup and view all the answers

What is a microprocessor?

<p>A silicon chip that contains a CPU and performs computer processing functions.</p> Signup and view all the answers

What is an instruction set?

<p>The basic set of commands that a microprocessor understands.</p> Signup and view all the answers

What does ASCII stand for?

<p>American Standard Code for Information Interchange.</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Data Transfer

  • Upload: Transfer data/software from a smaller to a larger computer.
  • Download: Transfer data/software from a larger computer or peripheral device to a nearby computer.

Networking Devices

  • Router: Hardware/software that routes data between computers via a specific IP address.
  • Modem: Device that transmits data over telecommunication lines for computer communication.
  • Host: A computer system accessed by a user from a remote location.
  • Client: Application on a personal computer or workstation that depends on a server for operations.

Network Components

  • Nodes: Processing locations such as computers or printers within a network.
  • Server: Manages network resources and provides services to clients.
  • Network Interface Card (NIC): Expansion board used to connect a computer to a network.

Network Structures

  • LAN (Local Area Network): Network covering a small geographic area.
  • WAN (Wide Area Network): Network that spans a large geographic area.
  • MAN (Metropolitan Area Network): Network covering a city or metropolitan area.
  • Network Topology: The physical or logical arrangement of a network (e.g. bus, ring, star, mesh).

Data Transmission Protocols

  • Protocol: Agreed format for transmitting data, including error checking and data compression.
  • Packets: Segments of a message sent over a packet-switching network.
  • Packet Switching: Divides messages into packets for individual transmission, which are reassembled at the destination.
  • Circuit Switching: Establishes a dedicated channel for data transmission.

Data Transfer Methods

  • Asynchronous Transmission: Data sent intermittently, not as a steady stream.
  • Synchronous Transmission: Data sent at regular intervals.

Network Performance Metrics

  • BPS (Bits Per Second): Measurement of data transfer speed.
  • Bandwidth: Amount of data transmitted in a specific period.
  • Latency: Delay before a transfer of data starts following a request.

Network Types

  • Peer-to-Peer Network: Each workstation holds equal responsibilities and capabilities.
  • Client-Server Network: A powerful central computer connects multiple less powerful workstations.
  • Wireless Networks: Utilize wireless data connections to link network nodes.

Internet Technologies

  • Internet: A global network of millions of interconnected computers.
  • WWW (World Wide Web): System of interlinked hypertext documents accessed via the Internet.

IP Addressing

  • Static IP Address: Does not change and is less common.
  • Dynamic IP Address: Changes over time and has increased security.
  • IPv4 vs. IPv6: Protocols for identifying and routing traffic on networks; IPv6 is an upgrade to IPv4.

Security and Privacy

  • Cookies: Messages stored on the browser by a web server for tracking purposes.
  • Phishing: Fraudulent attempts to acquire sensitive information via disguised emails.
  • Spoofing: Trickery to mislead hardware or software systems.
  • Spam: Unwanted electronic messages or postings.

Cyber Threats

  • Virus: Malicious code that operates without user consent.
  • Worm: Self-replicating program that spreads over networks.
  • Trojan Horse: Malicious software disguised as benign applications.
  • Denial of Service Attack (DDoS): Attempts to make network resources unavailable.

Data Encryption

  • Encryption: Converting data into a secret code for protection.
  • Public Key Encryption: Uses a public and a private key for secure communications.
  • Symmetric Encryption: Same key for both encrypting and decrypting data.

Software and Hardware

  • Application Software: Programs designed for users such as word processors and web browsers.
  • Hardware: Physical components of a computer system.
  • Microprocessor: Silicon chip containing the CPU functions.

Miscellaneous Concepts

  • Abstraction: Identifying common features of objects and procedures.
  • Digital Signature: Unique codes attached to messages for identity verification.
  • Firewall: Security system to control access to a network.
  • VPN (Virtual Private Network): Network that uses public channels to connect securely to a private network.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Database and Computer Science Concepts Quiz
6 questions
Computer Science Key Terms
16 questions

Computer Science Key Terms

ProtectiveSatellite avatar
ProtectiveSatellite
Computer Science Glossary Terms
10 questions
Computer Science Chapters 1-3 Quiz
5 questions
Use Quizgecko on...
Browser
Browser