Document Details
Uploaded by IrresistibleBigfoot
Related
- PCSII Depression/Anxiety/Strong Emotions 2024 Document
- A Concise History of the World: A New World of Connections (1500-1800)
- Human Bio Test PDF
- University of Santo Tomas Pre-Laboratory Discussion of LA No. 1 PDF
- Vertebrate Pest Management PDF
- Lg 5 International Environmental Laws, Treaties, Protocols, and Conventions
Full Transcript
bit (1-0) Byte 8 bits Kilobyte (KB) 1000 bytes(1 thousand) Megabyte (MB) (1,000,000) 1 million bytes Gigabyte (GB) (1,000,000,000)1 billion bytes Terabyte (TB) (1,000,000,000,000)1 trillion bytes Petabyte (PB) (1,000,000,000,000,000) A quadrillion bytes Kbps (Kilobits Per Second) 1000...
bit (1-0) Byte 8 bits Kilobyte (KB) 1000 bytes(1 thousand) Megabyte (MB) (1,000,000) 1 million bytes Gigabyte (GB) (1,000,000,000)1 billion bytes Terabyte (TB) (1,000,000,000,000)1 trillion bytes Petabyte (PB) (1,000,000,000,000,000) A quadrillion bytes Kbps (Kilobits Per Second) 1000 bits per second Mbps (megabits per second) 1,000,000 (1 million bits per second) Gbps (gigabits per second) 1,000,000,000(1 billion bits per second Tbps (Terabits per second) 1,000,000,000,000)1 trillion bits per second. bps bits per second Megahertz (MHz) 1,000,000cps(1 million cycles per second. Gigahertz(GHz) (1,000,000,000) 1 billion cycles per second or 1000 million cycles per second Integers Any whole number Floating Point Numbers Any number with a decimal Boolean Values True or false values(1 or 0) Characters Any symbol used(Ex.$,#,1,9,) Strings Collection of text(Ex. studying is so hard.) Unicode International character encoding standard(Has a number for each character across languages) The value of data Computer data can considered a asset. Security control is a mechanism to protect said assets. ROSI(Return in security investment) Is the calculation of how much money it would cost a organization for the loss of data and how likely the data loss is to occur. Data exfiltration When someone removes data from a network without authorization. Data breach When a network exposes private data publicly. Examples of security controlsBackup, Access control, Permissions Backup makes super that there are copies of you data and it is easy to access. Access controlControlling who has access to your data. Permissions Something that allows or restrict someone from doing a certain thing.(Edit,View,Suggest) Wired A physical connection between two things. RJ-11 Telephone cable-4 wires (Black,Red,Green,Yellow.) RJ-45 Ethernet cable-8 wires(White/Orange,Orange,White/Green,Blue,White/Blue,Green,White/Brown,Brown Wireless A non-physical connection between two things. Bluetooth Short range connection NFC Near Field Communication USB Universal Serial Bus Firewire IEEE 1394 standard(type of cable.) Thunderbolt Use to be apple only, now its USB C (didnt become usb C was old apple) designed by INTEL RF radio frequency(Just like NFC but requires physical contact) HDMI VIdeo + audio, Digital Display port 20 pin connector VGA Video Graphic Array ( 15 pin) Blue, most common DVI Digital Visual Interface FCC Federal Communications Commission Firmware program to help hardware operate (basic input output system) RAM (random access memory)volatile memory CPU central processing unit (brain) ARM Uses (RISC) reduced instruction set computing Mobile phone brain of the phone (android is snapdragon) Tablet Brain of the tablet (big phone) Storage Places were things get held Hard drive moving parts (disc) SSD (solid state drive) No moving parts GPU(graphic processing unit) Controls the visuals you see on screen Cooling Prevents the system from overheating NIC Network interface card Onboard came with the device Add on card device that needs to be added Fiber optic faster internet (better for long distance) (glass) Cable hybrid fiber coax (uses a cable for modern internet) DSL (digital subscriber line) SOHO(Small office/Home office)internet service type Radio frequency local network using wifi standard equipment Satellite Bigger area of coverage (Home internet) Cellular Radio transmitters (used for phones) (uses base station and cell stations Volatile-data Only kept in the memory while there is power Non-volatile-data Stored in the memory while there is power Optical uses lightwaves produced by lazer Flash Drive Storage device (usually in USB) NAS- (network attached storage) Supports network file access protocols File server A central machine that provides file and print services Cloud storage device Allows files to be saved offsite location DNS(Domain name system) System that translates name into IP addresses LAN Local Area Network(homes offices and buildings) WAN Wide area network (college campuses, data centers, large areas) WAP Wireless access point (it is a wireless device connected to a wired network and is a central hub for wireless communication) IP address Internet protocol address( a numeric label assigned to devices to communicate) MAC address A 12 digit hexadecimal, identifies a device on a network (Media Acces Control address) Modem A device that connects a computer to the internet by converting digital data into analog signals that can be transmitted over telephone lines or other communication lines. Router A device that forwards data packets to the appropriate parts of a network. Switch Hardware component that connects multiple devices on a network and allows them to share data Access point A device that connects wireless devices to a wired communications Firewall Blocks unauthroized access and protects from viruses HTTP Hyper text transfer protocol Port number of HTTP 80 HTTPS Hyper text transfer protocol secure Port number of HTTPS 443 POP3 Post office protocol(Email) Port number of POP3 110 IMAP Internet Message Access Protocol Port number of IMAP 143 SMTP Simple Mail Transfer Protocol Port numbers of SMTP 25/587 Encrypted conceal data in (something) by converting it into a code WEP(Weeak) Wired equivalent Privacy (1997) (least secure) WPA(iffy) Wi-fi protected access (2003) (Iffy) WPA2(most secure) Wifi protected access (second gen) (2004)