Intro to CS Rutgers Exam 1 Flashcards
100 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does 'Upload' mean?

  • To transfer data from a large computer to a smaller computer
  • To delete data from a device
  • To retrieve data from a server
  • To transfer data from a smaller computer to a larger computer (correct)
  • What does 'Download' mean?

  • Both A and B (correct)
  • To transfer data from a larger to a smaller computer
  • To send data to external storage
  • To transfer data from a distant to a nearby computer
  • What is a router?

    A piece of hardware or software having a specific IP address connected to network nodes for data transfer between computers.

    What is a modem?

    <p>An electronic device that enables transmission of data to or from a computer via telephone or other communication lines.</p> Signup and view all the answers

    What is a host?

    <p>A computer system that is accessed by a user working at a remote location.</p> Signup and view all the answers

    What is a client?

    <p>An application that runs on a personal computer or workstation and relies on a server for operations.</p> Signup and view all the answers

    What are nodes in a network?

    <p>Processing locations that can be a computer or other devices like printers.</p> Signup and view all the answers

    What is a server?

    <p>A computer or device on a network that manages network resources.</p> Signup and view all the answers

    What is a network interface card (NIC)?

    <p>An expansion board you insert into a computer to connect to a network.</p> Signup and view all the answers

    What is network topology?

    <p>The shape of the local-area network (LAN) or communications system, which can be either physical or logical.</p> Signup and view all the answers

    What is a protocol in networking?

    <p>An agreed-upon format for transmitting data between two devices.</p> Signup and view all the answers

    What does LAN stand for?

    <p>Local-area network.</p> Signup and view all the answers

    What does WAN stand for?

    <p>Wide-area network.</p> Signup and view all the answers

    What does MAN stand for?

    <p>Metropolitan-area network.</p> Signup and view all the answers

    What is FTP?

    <p>File transfer protocol.</p> Signup and view all the answers

    What are packets in networking?

    <p>Pieces of a message transmitted over a packet switching network.</p> Signup and view all the answers

    What is circuit switching?

    <p>A type of communication where a dedicated channel is established for the duration of a transmission.</p> Signup and view all the answers

    What is packet switching?

    <p>A protocol where messages are divided before sending, with each transmitted individually.</p> Signup and view all the answers

    What is asynchronous transmission?

    <p>Communications where data is transmitted intermittently rather than as a steady stream.</p> Signup and view all the answers

    What is synchronous transmission?

    <p>Communication where data occurs at regular intervals.</p> Signup and view all the answers

    What does BPS stand for?

    <p>Bits per second.</p> Signup and view all the answers

    What is bandwidth?

    <p>The amount of data that can be transmitted in a fixed amount of time.</p> Signup and view all the answers

    What is latency?

    <p>The period of time that one component in a system is waiting for another component.</p> Signup and view all the answers

    What is a peer-to-peer network?

    <p>A type of network where each workstation has equivalent capabilities and responsibilities.</p> Signup and view all the answers

    What is a client-server network?

    <p>A network where one centralized computer (server) connects to multiple less powerful computers (clients).</p> Signup and view all the answers

    What are wireless networks?

    <p>Networks that use wireless data connections for connecting nodes.</p> Signup and view all the answers

    What is Bluetooth?

    <p>A short-range radio technology aimed at simplifying communications between devices.</p> Signup and view all the answers

    What is a hotspot?

    <p>A specific geographic location providing public wireless broadband network services.</p> Signup and view all the answers

    What is the Internet?

    <p>A global network connecting millions of computers.</p> Signup and view all the answers

    What does WWW stand for?

    <p>World Wide Web.</p> Signup and view all the answers

    What is a static IP address?

    <p>An IP address that does not change.</p> Signup and view all the answers

    What is a dynamic IP address?

    <p>An IP address that changes over time.</p> Signup and view all the answers

    What are IPv6 and IPv4?

    <p>Communications protocols for identifying and locating computers on networks; IPv6 is intended to replace IPv4.</p> Signup and view all the answers

    What is TCP/IP?

    <p>Transmission Control Protocol / Internet Protocol.</p> Signup and view all the answers

    What does HTML stand for?

    <p>Hypertext Markup Language.</p> Signup and view all the answers

    What is the IEEE?

    <p>An organization composed of engineers, scientists, and students.</p> Signup and view all the answers

    What are cookies in web technology?

    <p>Messages given to the web browser by the web server, which are stored in a text file.</p> Signup and view all the answers

    What is broadband?

    <p>Data transmission where a single medium carries multiple channels at once.</p> Signup and view all the answers

    What is DSL/Cable?

    <p>Digital Subscriber Line, a high-speed internet connection method using telephone lines.</p> Signup and view all the answers

    What is a browser?

    <p>A software application used to locate, retrieve, and display content on the World Wide Web.</p> Signup and view all the answers

    What is a search engine?

    <p>Programs that search documents for specified keywords and return lists of matching documents.</p> Signup and view all the answers

    What does IMAP stand for?

    <p>Internet Message Access Protocol.</p> Signup and view all the answers

    What does VOIP stand for?

    <p>Voice Over Internet Protocol.</p> Signup and view all the answers

    What does DNS stand for?

    <p>Domain Name System.</p> Signup and view all the answers

    What does SMTP stand for?

    <p>Simple Mail Transfer Protocol.</p> Signup and view all the answers

    What is IETF?

    <p>Internet Engineering Task Force.</p> Signup and view all the answers

    What does SSL/TLS stand for?

    <p>Secure Sockets Layer / Transport Layer Security.</p> Signup and view all the answers

    What are web crawlers (or spiders)?

    <p>Programs that automatically fetch web pages to feed them to search engines.</p> Signup and view all the answers

    What is a meta tag?

    <p>A special HTML tag that provides information about a web page.</p> Signup and view all the answers

    What is a mash-up in cybersecurity?

    <p>A new breed of web-based applications mixing at least two different services to enhance security.</p> Signup and view all the answers

    What is an ISP?

    <p>Internet Service Provider.</p> Signup and view all the answers

    What does URL stand for?

    <p>Uniform Resource Locator.</p> Signup and view all the answers

    What is phishing?

    <p>An email that falsely claims to be a legitimate enterprise to scam the user into surrendering private information.</p> Signup and view all the answers

    What is spoofing?

    <p>Describes ways hardware and software can be fooled.</p> Signup and view all the answers

    What is pharming?

    <p>A method to obtain personal or private information through domain spoofing.</p> Signup and view all the answers

    What is spam?

    <p>Electronic junk mail or junk postings in newsgroups.</p> Signup and view all the answers

    What is privacy in computing?

    <p>The security level of personal data published via the internet.</p> Signup and view all the answers

    What is a virus?

    <p>A program or piece of code loaded onto your computer without your knowledge, running against your wishes.</p> Signup and view all the answers

    What is a worm?

    <p>A program or algorithm that replicates itself over a network and usually performs malicious actions.</p> Signup and view all the answers

    What is a trojan horse?

    <p>A destructive program masquerading as a benign application.</p> Signup and view all the answers

    What are botnets/zombies?

    <p>Computers implanted with daemons controlled by a malicious hacker without the owner's knowledge.</p> Signup and view all the answers

    What is spyware?

    <p>Software that gathers user information covertly through the internet connection.</p> Signup and view all the answers

    What does HTTPS stand for?

    <p>Hypertext Transfer Protocol Secure.</p> Signup and view all the answers

    What is adware?

    <p>Software that contains embedded advertisements.</p> Signup and view all the answers

    What is a web bug?

    <p>An object embedded in a web page or email that allows checking user access.</p> Signup and view all the answers

    What is SFTP?

    <p>Secure File Transfer Protocol, a method for transferring files securely over a data stream.</p> Signup and view all the answers

    What is encryption?

    <p>The translation of data into a secret code.</p> Signup and view all the answers

    What is PGP?

    <p>Pretty Good Privacy, a technique for encrypting messages.</p> Signup and view all the answers

    What is public key encryption?

    <p>A cryptographic system using a public key for encryption and a private key for decryption.</p> Signup and view all the answers

    What is symmetric encryption?

    <p>A type of encryption where the same key is used for both encryption and decryption.</p> Signup and view all the answers

    What is cryptography?

    <p>The art of protecting information by transforming it into cipher text.</p> Signup and view all the answers

    What is a cipher?

    <p>Encrypted data that is unreadable until decrypted with a key.</p> Signup and view all the answers

    What is Caesar's cipher?

    <p>A simple substitution cipher shifting letters in the alphabet.</p> Signup and view all the answers

    What is a digital signature?

    <p>A digital code attached to an electronically transmitted message to identify the sender.</p> Signup and view all the answers

    What is a firewall?

    <p>A system designed to prevent unauthorized access to or from a network.</p> Signup and view all the answers

    What is cyberstalking?

    <p>The repeated use of electronic communications to harass or frighten someone.</p> Signup and view all the answers

    What is TOR?

    <p>An anonymous internet communication system based on a distributed network.</p> Signup and view all the answers

    What is WikiLeaks?

    <p>A multinational media organization that publishes large datasets of censored materials.</p> Signup and view all the answers

    What is Snapchat?

    <p>A mobile app allowing users to send self-destructing videos and pictures.</p> Signup and view all the answers

    What is CyberDust?

    <p>An application that combines the ease of text messaging with the privacy of phone calls.</p> Signup and view all the answers

    What is a denial of service attack (DDoS)?

    <p>An attempt to make a machine or network resource unavailable to users.</p> Signup and view all the answers

    What are Google Glass?

    <p>An optical head-mounted display designed like eyeglasses.</p> Signup and view all the answers

    What is steganography?

    <p>The art of hiding information by embedding messages within other messages.</p> Signup and view all the answers

    What is cyberbullying?

    <p>Online harassment through electronic communications.</p> Signup and view all the answers

    What is a VPN?

    <p>A network constructed using public wires to connect to a private network.</p> Signup and view all the answers

    What is a biometric identifier?

    <p>Distinctive, measurable characteristics used to label and describe individuals.</p> Signup and view all the answers

    What is application software?

    <p>Programs designed for end users, like word processors and web browsers.</p> Signup and view all the answers

    What is abstraction in computing?

    <p>The process of picking out common features of objects and procedures.</p> Signup and view all the answers

    What is binary representation of data?

    <p>A format for data representation using strings of 0 and 1.</p> Signup and view all the answers

    What is octal?

    <p>A base-8 number system using symbols 0-7.</p> Signup and view all the answers

    What is hexadecimal?

    <p>A base-16 number system using symbols 0-9 and A-F.</p> Signup and view all the answers

    What is hardware?

    <p>Physical objects that you can touch, like disks and keyboards.</p> Signup and view all the answers

    What is software?

    <p>Computer instructions or data stored electronically.</p> Signup and view all the answers

    What is TRIM in SSDs?

    <p>Allows the operating system to inform an SSD about unused blocks that can be wiped.</p> Signup and view all the answers

    What does RFID stand for?

    <p>Radio Frequency Identification.</p> Signup and view all the answers

    What is a bit?

    <p>Binary digit; the smallest unit of information on a machine, holding values of 0 or 1.</p> Signup and view all the answers

    What is a byte?

    <p>A unit of storage capable of holding a single character, equal to 8 bits.</p> Signup and view all the answers

    What is a microprocessor?

    <p>A silicon chip that contains a CPU and performs computer processing functions.</p> Signup and view all the answers

    What is an instruction set?

    <p>The basic set of commands that a microprocessor understands.</p> Signup and view all the answers

    What does ASCII stand for?

    <p>American Standard Code for Information Interchange.</p> Signup and view all the answers

    Study Notes

    Data Transfer

    • Upload: Transfer data/software from a smaller to a larger computer.
    • Download: Transfer data/software from a larger computer or peripheral device to a nearby computer.

    Networking Devices

    • Router: Hardware/software that routes data between computers via a specific IP address.
    • Modem: Device that transmits data over telecommunication lines for computer communication.
    • Host: A computer system accessed by a user from a remote location.
    • Client: Application on a personal computer or workstation that depends on a server for operations.

    Network Components

    • Nodes: Processing locations such as computers or printers within a network.
    • Server: Manages network resources and provides services to clients.
    • Network Interface Card (NIC): Expansion board used to connect a computer to a network.

    Network Structures

    • LAN (Local Area Network): Network covering a small geographic area.
    • WAN (Wide Area Network): Network that spans a large geographic area.
    • MAN (Metropolitan Area Network): Network covering a city or metropolitan area.
    • Network Topology: The physical or logical arrangement of a network (e.g. bus, ring, star, mesh).

    Data Transmission Protocols

    • Protocol: Agreed format for transmitting data, including error checking and data compression.
    • Packets: Segments of a message sent over a packet-switching network.
    • Packet Switching: Divides messages into packets for individual transmission, which are reassembled at the destination.
    • Circuit Switching: Establishes a dedicated channel for data transmission.

    Data Transfer Methods

    • Asynchronous Transmission: Data sent intermittently, not as a steady stream.
    • Synchronous Transmission: Data sent at regular intervals.

    Network Performance Metrics

    • BPS (Bits Per Second): Measurement of data transfer speed.
    • Bandwidth: Amount of data transmitted in a specific period.
    • Latency: Delay before a transfer of data starts following a request.

    Network Types

    • Peer-to-Peer Network: Each workstation holds equal responsibilities and capabilities.
    • Client-Server Network: A powerful central computer connects multiple less powerful workstations.
    • Wireless Networks: Utilize wireless data connections to link network nodes.

    Internet Technologies

    • Internet: A global network of millions of interconnected computers.
    • WWW (World Wide Web): System of interlinked hypertext documents accessed via the Internet.

    IP Addressing

    • Static IP Address: Does not change and is less common.
    • Dynamic IP Address: Changes over time and has increased security.
    • IPv4 vs. IPv6: Protocols for identifying and routing traffic on networks; IPv6 is an upgrade to IPv4.

    Security and Privacy

    • Cookies: Messages stored on the browser by a web server for tracking purposes.
    • Phishing: Fraudulent attempts to acquire sensitive information via disguised emails.
    • Spoofing: Trickery to mislead hardware or software systems.
    • Spam: Unwanted electronic messages or postings.

    Cyber Threats

    • Virus: Malicious code that operates without user consent.
    • Worm: Self-replicating program that spreads over networks.
    • Trojan Horse: Malicious software disguised as benign applications.
    • Denial of Service Attack (DDoS): Attempts to make network resources unavailable.

    Data Encryption

    • Encryption: Converting data into a secret code for protection.
    • Public Key Encryption: Uses a public and a private key for secure communications.
    • Symmetric Encryption: Same key for both encrypting and decrypting data.

    Software and Hardware

    • Application Software: Programs designed for users such as word processors and web browsers.
    • Hardware: Physical components of a computer system.
    • Microprocessor: Silicon chip containing the CPU functions.

    Miscellaneous Concepts

    • Abstraction: Identifying common features of objects and procedures.
    • Digital Signature: Unique codes attached to messages for identity verification.
    • Firewall: Security system to control access to a network.
    • VPN (Virtual Private Network): Network that uses public channels to connect securely to a private network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    These flashcards cover key terms and definitions related to the first exam in an introductory computer science course at Rutgers. Terms such as 'Upload', 'Download', and 'Router' are defined to aid in understanding fundamental concepts. Perfect for students preparing for their assessments.

    More Like This

    Database and Computer Science Concepts Quiz
    6 questions
    Computer Science Key Terms
    16 questions

    Computer Science Key Terms

    ProtectiveSatellite avatar
    ProtectiveSatellite
    Computer Science 120 Terms
    26 questions

    Computer Science 120 Terms

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Computer Science Glossary Terms
    10 questions
    Use Quizgecko on...
    Browser
    Browser