• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

What is collaboration?

Collaboration occurs when two or more people work together to achieve a common goal or result. It is considered efficient when more work is done through group than individual

The effectiveness of groups can be measured under 4 critical factors:



1. Communication skills and culture:


Communication is the most important skill


2. Communications systems:


Its important to have structured well built communication systems to make sure worldwide workers can be connected


3. Content Management:


it helps manage different users accessing the same information. its important for databases and content managements systems with no interference between applications and users


4. Workflow Control:


The process by which content is created, edited, used, and discarded.




The difference between workflow and business process is that business process focuses on delivering a good or service externally to a customer, whereas a workflow process looks to deliver a good or service to other employees within the organization

Telecommunication

The electronic transfer of data




examples two devices speaking together, also known as transmission media

what are the two ways that transmission media is passed through

A transfer of electronic data is considered transmission media




There are 2 types wired and wireless:




Wired (guided): Twisted copper pair, coaxial, and fibre optic cables




Wireless (Unguided): Free space, Radiowaves (omni directional), Microwaves, infrared (line of sight)

Optical Cables VS UTP Cables

Optical cables can carry more information, less sensitive to signal interference, and have greater transmission distance AND they optical pulses rather than electric signals

Transmission Media electronic data can be transferred through _______ and measured in_______ (Micro scale)

bandwith




Bits


Kbs, Mbps, gbps

Data can be sent in two basic formats

Analog: continuous varying waves that are smooth but inaccurate



Digital: Sent through series of bits (1: high voltage, 0: low voltage) accurate but choppy


What are protocols?

The procedures used to transfer information and data is called Protocols




Protocols ensure that data being sent from one machine will be recognized by other machine receiving the data. Both machines need to agree and carry the same formulas

What is a computer network? and how big can they be?

A computer network is a group of computers that communicate through transmission media




a network can be as big as two small machines or many machines over great continents

What are the 3 major types of networks?

1. LAN: Connects devices within a relatively small, single geographical location. Focuses on one single geographical location. Connected to




2. WAN: Connected devices at different geographical locations. The difference between LAN and WAN is that you can't rub cable between two cities, need a licensed company to help with that.




3. Internet: A network of networks. there are also private networks called intranets

What is a LAN

A LAN is a small group of connected devices between 2 and several hundred in a small geographical area.




Designed to share resources between those computers, such as file server, printer sharing, and application sharing







What is WAN

WAN connects two devices that are in two or more separate sites




use networks from vendors that are licensed by the government,

What is a NIC (full name) and its purpose

ALL LAN devices have a hardware component called the Network Interface Card (NIC) that connects the devices circuitry to the network cable. NIC helps devices implement the protocols necessary for communication via a unique Media Access Control address thats unique to hardware.




They run through Unshielded twisted pair (UTP) cables and Optical fibre cables. and run the 802.3 Ethernet Protocol

Whats the difference between WPAN, WLAN, LAN and AP


and what are the different protocols that they use

WLAN connects without the use of a network cable.



NIC operates on 802.3 Ethernet Protocol


WNIC operates on 802.11 WIFI Protocol


WNIC has to connect to an Access Point (AP)


AP process both standards and connects to ethernet and transmits its through WIFI


WPAN operates on 802.15 protocol Bluetooth

What is M-Commerce

M-Commerce allows for users to use new types of applications that are considered mobile and allow for things like mobile banking or mobile ticket purchasing.

What is the difference between WWAN and WLAN and how does WWAN work?

WWAN covers a larger area and use cellular networks to transfer data and information that is provided by Internet service providers




1.A mobile device which has a WWAN modem


2. connects to a base station that remits radio waves


3. the data is then sent to a mobile switching centre which then sends it to the correct ISP


4. The information is sent to the mobile device

What is the difference between the Web and the Internet and what are other forms of communication infrastructures

The web was created in 1989 which is a subset of the internet. The Web consists of sites and users that process the Hypertext Transfer Protocol (HTTP) and programs that implement are called browsers. (WWW) is a software not a network




There is also things like Simple Mail transfer Protocol (SMTP) for sending and POP (Post office Program) to receive and File transfer protocol (FTP)

What is the Internet?

The internet is a network and comprised of network of networks




uses different communication methods and conventions





3 Important functions of the ISP


and 2 types of speeds it uses

1. Provides your computer or router with an internet Address




2. It serves as a gateway for the internet. The ISP receives the address from your router and than passes the information from the internet back to your router




3. the ISP helps pay for the internet by collecting money from their customers and pay access fees on your behalf




Narrowband : less than 56kbps


Broadband: more than 256Kbps

What is a TLD, Domain Name, URL, and IP

- The last letters in any domain name are referred to as TOP LEVEL DOMAIN which represents .CA .COM . ORG




- Memorable names for internet resources




- Uniform Resource Locator (URL) which is an easy to remember web address




- an IP is a public address for every device on a network (There are public and private ones)



What is a DNS, DNR and DN resolvers

Is a Domain name system that converts human friendly website names into computer friendly web addresses.




The DNS is a giant index that connects human address' to computer ones, and if the DNS doesn't work then addresses cannot be found unless you know the site number




The process of switching between the two is is called the domain name resolution. and the Domain name resolvers are tasked with indexing

what are the 3 different ways that home computers or small business connect to an ISP

1. Regular telephone lines (Dial up)




2. Special telephone lines (DSL Line)




3. Cable TV line




Modems are needed to convert digital computer data into analog waves before being sent, and they also convert from analog to digital when they receive it

What are Dial up, (A,S)DSL, and Cable Modems

Dial modems: Interfere with Telephone calls, and require calling ISP and can only process at 56kbps, when multiple users, they use the slowest data speeds




DSL modems: Operates on same telephone lines, but doesn't interfere with phone signal, and are always connected to servers and faster data transmissions than dial up.


Asymmetric DSL modems are mostly used in homes as they receive more data than transmitting it


Symmetric DSL modems are used by bigger businesss or place that need to send and receive a lot of data.




Cable Modem: Do not interfere with tv signal, very fast data transmission, they use fibre optic cables to run to neighbourhood distribution centre and run to subscriber

What purposes are mobile devices for

Collaboration and communication

What are networks layers? and name each layer

Transmission Control Protocol/Internet Protocol (TCP/IP)



(Application) Layer 4: provides protocols to allow different applications to communicate with each other and the user (Browsers, emails, FTP)




(Internet, Transport) Layer 2+3=Used to communicate between different computers in the internet




(network access)Layer 1: Used to transmit data within a single network (LAN)






HOW TO ACCESS THE INTERNET AND HOW IT WORKS (URL, DOMAIN NAME, IP) (Layer 4)

1. When we search sfu.ca we are identifying a location or address (Uniform Resource Locator) on the internet. The URL contains the domain name and a full path to the resource



2. The address is defined as an IP number. is a 4 byte value that is separated by periods and are given decimal numbers between (0-255)




3. The Domain name system will translate the Url to an IP number




4. (layer 4) Then we must use the help of the Hypertext Transfer Protocol to request the URL and receives normally the HTML




5. Now that we created the HTTP request we have to deliver it to the right address, which is the job of the TCP/IP



HOW DOES THE TCP/IP SEND ITS DATA (LAYER 3)

1. (LAYER 3): The TCP sends packets of data, by breaking down HTTP data units into 512Kbps sizes that are attached with sequence numbers, they are in charge of making sure it gets from the client to the server




2. the TCP is a Connection oriented protocol that makes sure to fix any errors, and resends any missing information

HOW DOES THE TCP/IP SEND ITS DATA (LAYER 2)

The main purpose of the IP is to transfer data packets across from computer to computer it sends packets of packets based off the IP and runs through gateways (Department, organization, city, country)

HOW DOES THE TCP/IP SEND ITS DATA THROUGH PACKET SWITCHING

Data is broken down into segments


and segments into packages through the use of Packet assembler/dissasemble (PAD)




The IP places that data at the front of the packet which is in front of the TCP segment data.




The header informations shows the address, how many packets and packet order

HOW DOES THE TCP/IP SEND ITS DATA THROUGH PACKET SWITCHING THROUGH WHOSE YOUR DADDY, UNTIL THEY ARE UNPACKED

Packets are then sent through routers hitting different nodes and asking are you my daddy? if not then it gets sent to the next node and keeps going through until it hits the correct one.




Once they reach the other end, they are disassembled by the PAD in order

WHAT HAPPENS ONCE THE REQUEST IS RECEIVED AND RESPONDED

Once the TCP and IP do their job the request lands at the site through the HTTP of the server, the response is then generated by the HTTP and is sent back to the sender with a small file containing the file of the URL.

What is network externality?

Network externality is the belief that the more users on a network, the more valuable it becomes to everyone (Network effect)



When the network hits the critical mass, it begins to explode and grow at a super rapid rate

What are firewalls, port, ACL, and Packet filtering firewalls

A computing device that prevents unauthorized network access and gets its name from forest fires.




A port number is a uniquely decided to specific transactions over a network, and when a firewall is enabled, it stops any foreign access to that specific port number




Access control list will keep track of which IP's are allowed to access the ports




Packet Filtering firewalls: Are the simplest type of firewalls, it examines that packets that are being sent in and will decide whether or not to let it go through, best way is used by blocking social media sites in the workplace.

What is encryption? and the 2 types

It allows for clear text to turn into coded unlegible messages for secure storage or communication. A key is a number that encrypts the messages and creates an algorithm to code the original message.




In symmetric encryption: There is only one key that is used to code and decode the message




In Asymmetric encryption: There are different keys for locking and unlocking message.

Whats the difference between HTTP and HTTPS and SSL

HTTPS is data that is encrypted using a protocol called Secure Socket Layer (SSL) aka (TSL), they use the combination of private and public symmetric encryption. Both you and the website produce private and public keys that must be switched and shared with each other.

What is a VPN and how does it work?

They use public or private internet to create virtual private point to point network. A VPN client and a VPN server are needed to create a tunnel that only they can use, once the VPN server receives the message, they strip the address and decode the message for the Receiving user

how does a search engine work?

First search engine was named Archie.


Search engines need require 2 things


1. Way to collect URL's


2. Method for storing/accessing the URLS so that they can be searched




- Web crawlers/spiders go through the internet by starting with Seed URLs and go through information looking for hyperlinks that lead to more URLs to index




Searching engine indexing: the at of organizing information retrieved from web crawlers and indexes them by putting them in specific sets of rules.

WHAT PERCENTAGE OF INTERNET IS COVERED BY SEARCH ENGINES AND ORDER OF SEARCH RESULTS

Search engines cover roughly 16 percent of the web.




Search engines results are displayed most based of the relevance of the search query, so it'll read through its index and offer which one mostly relates to the query, and matches depend on Criteria used. Also it can be done advertising and selling top spots on search results.