Podcast
Questions and Answers
What does 'Upload' mean?
What does 'Upload' mean?
- To transfer data from a large computer to a smaller computer
- To delete data from a device
- To retrieve data from a server
- To transfer data from a smaller computer to a larger computer (correct)
What does 'Download' mean?
What does 'Download' mean?
- Both A and B (correct)
- To transfer data from a larger to a smaller computer
- To send data to external storage
- To transfer data from a distant to a nearby computer
What is a router?
What is a router?
A piece of hardware or software having a specific IP address connected to network nodes for data transfer between computers.
What is a modem?
What is a modem?
What is a host?
What is a host?
What is a client?
What is a client?
What are nodes in a network?
What are nodes in a network?
What is a server?
What is a server?
What is a network interface card (NIC)?
What is a network interface card (NIC)?
What is network topology?
What is network topology?
What is a protocol in networking?
What is a protocol in networking?
What does LAN stand for?
What does LAN stand for?
What does WAN stand for?
What does WAN stand for?
What does MAN stand for?
What does MAN stand for?
What is FTP?
What is FTP?
What are packets in networking?
What are packets in networking?
What is circuit switching?
What is circuit switching?
What is packet switching?
What is packet switching?
What is asynchronous transmission?
What is asynchronous transmission?
What is synchronous transmission?
What is synchronous transmission?
What does BPS stand for?
What does BPS stand for?
What is bandwidth?
What is bandwidth?
What is latency?
What is latency?
What is a peer-to-peer network?
What is a peer-to-peer network?
What is a client-server network?
What is a client-server network?
What are wireless networks?
What are wireless networks?
What is Bluetooth?
What is Bluetooth?
What is a hotspot?
What is a hotspot?
What is the Internet?
What is the Internet?
What does WWW stand for?
What does WWW stand for?
What is a static IP address?
What is a static IP address?
What is a dynamic IP address?
What is a dynamic IP address?
What are IPv6 and IPv4?
What are IPv6 and IPv4?
What is TCP/IP?
What is TCP/IP?
What does HTML stand for?
What does HTML stand for?
What is the IEEE?
What is the IEEE?
What are cookies in web technology?
What are cookies in web technology?
What is broadband?
What is broadband?
What is DSL/Cable?
What is DSL/Cable?
What is a browser?
What is a browser?
What is a search engine?
What is a search engine?
What does IMAP stand for?
What does IMAP stand for?
What does VOIP stand for?
What does VOIP stand for?
What does DNS stand for?
What does DNS stand for?
What does SMTP stand for?
What does SMTP stand for?
What is IETF?
What is IETF?
What does SSL/TLS stand for?
What does SSL/TLS stand for?
What are web crawlers (or spiders)?
What are web crawlers (or spiders)?
What is a meta tag?
What is a meta tag?
What is a mash-up in cybersecurity?
What is a mash-up in cybersecurity?
What is an ISP?
What is an ISP?
What does URL stand for?
What does URL stand for?
What is phishing?
What is phishing?
What is spoofing?
What is spoofing?
What is pharming?
What is pharming?
What is spam?
What is spam?
What is privacy in computing?
What is privacy in computing?
What is a virus?
What is a virus?
What is a worm?
What is a worm?
What is a trojan horse?
What is a trojan horse?
What are botnets/zombies?
What are botnets/zombies?
What is spyware?
What is spyware?
What does HTTPS stand for?
What does HTTPS stand for?
What is adware?
What is adware?
What is a web bug?
What is a web bug?
What is SFTP?
What is SFTP?
What is encryption?
What is encryption?
What is PGP?
What is PGP?
What is public key encryption?
What is public key encryption?
What is symmetric encryption?
What is symmetric encryption?
What is cryptography?
What is cryptography?
What is a cipher?
What is a cipher?
What is Caesar's cipher?
What is Caesar's cipher?
What is a digital signature?
What is a digital signature?
What is a firewall?
What is a firewall?
What is cyberstalking?
What is cyberstalking?
What is TOR?
What is TOR?
What is WikiLeaks?
What is WikiLeaks?
What is Snapchat?
What is Snapchat?
What is CyberDust?
What is CyberDust?
What is a denial of service attack (DDoS)?
What is a denial of service attack (DDoS)?
What are Google Glass?
What are Google Glass?
What is steganography?
What is steganography?
What is cyberbullying?
What is cyberbullying?
What is a VPN?
What is a VPN?
What is a biometric identifier?
What is a biometric identifier?
What is application software?
What is application software?
What is abstraction in computing?
What is abstraction in computing?
What is binary representation of data?
What is binary representation of data?
What is octal?
What is octal?
What is hexadecimal?
What is hexadecimal?
What is hardware?
What is hardware?
What is software?
What is software?
What is TRIM in SSDs?
What is TRIM in SSDs?
What does RFID stand for?
What does RFID stand for?
What is a bit?
What is a bit?
What is a byte?
What is a byte?
What is a microprocessor?
What is a microprocessor?
What is an instruction set?
What is an instruction set?
What does ASCII stand for?
What does ASCII stand for?
Flashcards are hidden until you start studying
Study Notes
Data Transfer
- Upload: Transfer data/software from a smaller to a larger computer.
- Download: Transfer data/software from a larger computer or peripheral device to a nearby computer.
Networking Devices
- Router: Hardware/software that routes data between computers via a specific IP address.
- Modem: Device that transmits data over telecommunication lines for computer communication.
- Host: A computer system accessed by a user from a remote location.
- Client: Application on a personal computer or workstation that depends on a server for operations.
Network Components
- Nodes: Processing locations such as computers or printers within a network.
- Server: Manages network resources and provides services to clients.
- Network Interface Card (NIC): Expansion board used to connect a computer to a network.
Network Structures
- LAN (Local Area Network): Network covering a small geographic area.
- WAN (Wide Area Network): Network that spans a large geographic area.
- MAN (Metropolitan Area Network): Network covering a city or metropolitan area.
- Network Topology: The physical or logical arrangement of a network (e.g. bus, ring, star, mesh).
Data Transmission Protocols
- Protocol: Agreed format for transmitting data, including error checking and data compression.
- Packets: Segments of a message sent over a packet-switching network.
- Packet Switching: Divides messages into packets for individual transmission, which are reassembled at the destination.
- Circuit Switching: Establishes a dedicated channel for data transmission.
Data Transfer Methods
- Asynchronous Transmission: Data sent intermittently, not as a steady stream.
- Synchronous Transmission: Data sent at regular intervals.
Network Performance Metrics
- BPS (Bits Per Second): Measurement of data transfer speed.
- Bandwidth: Amount of data transmitted in a specific period.
- Latency: Delay before a transfer of data starts following a request.
Network Types
- Peer-to-Peer Network: Each workstation holds equal responsibilities and capabilities.
- Client-Server Network: A powerful central computer connects multiple less powerful workstations.
- Wireless Networks: Utilize wireless data connections to link network nodes.
Internet Technologies
- Internet: A global network of millions of interconnected computers.
- WWW (World Wide Web): System of interlinked hypertext documents accessed via the Internet.
IP Addressing
- Static IP Address: Does not change and is less common.
- Dynamic IP Address: Changes over time and has increased security.
- IPv4 vs. IPv6: Protocols for identifying and routing traffic on networks; IPv6 is an upgrade to IPv4.
Security and Privacy
- Cookies: Messages stored on the browser by a web server for tracking purposes.
- Phishing: Fraudulent attempts to acquire sensitive information via disguised emails.
- Spoofing: Trickery to mislead hardware or software systems.
- Spam: Unwanted electronic messages or postings.
Cyber Threats
- Virus: Malicious code that operates without user consent.
- Worm: Self-replicating program that spreads over networks.
- Trojan Horse: Malicious software disguised as benign applications.
- Denial of Service Attack (DDoS): Attempts to make network resources unavailable.
Data Encryption
- Encryption: Converting data into a secret code for protection.
- Public Key Encryption: Uses a public and a private key for secure communications.
- Symmetric Encryption: Same key for both encrypting and decrypting data.
Software and Hardware
- Application Software: Programs designed for users such as word processors and web browsers.
- Hardware: Physical components of a computer system.
- Microprocessor: Silicon chip containing the CPU functions.
Miscellaneous Concepts
- Abstraction: Identifying common features of objects and procedures.
- Digital Signature: Unique codes attached to messages for identity verification.
- Firewall: Security system to control access to a network.
- VPN (Virtual Private Network): Network that uses public channels to connect securely to a private network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.