Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
38 Cards in this Set
- Front
- Back
What is collaboration? |
Collaboration occurs when two or more people work together to achieve a common goal or result. It is considered efficient when more work is done through group than individual |
|
The effectiveness of groups can be measured under 4 critical factors: |
1. Communication skills and culture: Communication is the most important skill 2. Communications systems: Its important to have structured well built communication systems to make sure worldwide workers can be connected 3. Content Management: it helps manage different users accessing the same information. its important for databases and content managements systems with no interference between applications and users 4. Workflow Control: The process by which content is created, edited, used, and discarded. The difference between workflow and business process is that business process focuses on delivering a good or service externally to a customer, whereas a workflow process looks to deliver a good or service to other employees within the organization |
|
Telecommunication |
The electronic transfer of data examples two devices speaking together, also known as transmission media |
|
what are the two ways that transmission media is passed through |
A transfer of electronic data is considered transmission media There are 2 types wired and wireless: Wired (guided): Twisted copper pair, coaxial, and fibre optic cables Wireless (Unguided): Free space, Radiowaves (omni directional), Microwaves, infrared (line of sight) |
|
Optical Cables VS UTP Cables |
Optical cables can carry more information, less sensitive to signal interference, and have greater transmission distance AND they optical pulses rather than electric signals |
|
Transmission Media electronic data can be transferred through _______ and measured in_______ (Micro scale) |
bandwith Bits Kbs, Mbps, gbps |
|
Data can be sent in two basic formats |
Analog: continuous varying waves that are smooth but inaccurate
Digital: Sent through series of bits (1: high voltage, 0: low voltage) accurate but choppy |
|
What are protocols? |
The procedures used to transfer information and data is called Protocols Protocols ensure that data being sent from one machine will be recognized by other machine receiving the data. Both machines need to agree and carry the same formulas |
|
What is a computer network? and how big can they be? |
A computer network is a group of computers that communicate through transmission media a network can be as big as two small machines or many machines over great continents |
|
What are the 3 major types of networks? |
1. LAN: Connects devices within a relatively small, single geographical location. Focuses on one single geographical location. Connected to 2. WAN: Connected devices at different geographical locations. The difference between LAN and WAN is that you can't rub cable between two cities, need a licensed company to help with that. 3. Internet: A network of networks. there are also private networks called intranets |
|
What is a LAN |
A LAN is a small group of connected devices between 2 and several hundred in a small geographical area. Designed to share resources between those computers, such as file server, printer sharing, and application sharing |
|
What is WAN |
WAN connects two devices that are in two or more separate sites use networks from vendors that are licensed by the government, |
|
What is a NIC (full name) and its purpose |
ALL LAN devices have a hardware component called the Network Interface Card (NIC) that connects the devices circuitry to the network cable. NIC helps devices implement the protocols necessary for communication via a unique Media Access Control address thats unique to hardware. They run through Unshielded twisted pair (UTP) cables and Optical fibre cables. and run the 802.3 Ethernet Protocol |
|
Whats the difference between WPAN, WLAN, LAN and AP and what are the different protocols that they use |
WLAN connects without the use of a network cable.
NIC operates on 802.3 Ethernet Protocol WNIC operates on 802.11 WIFI Protocol WNIC has to connect to an Access Point (AP) AP process both standards and connects to ethernet and transmits its through WIFI WPAN operates on 802.15 protocol Bluetooth |
|
What is M-Commerce |
M-Commerce allows for users to use new types of applications that are considered mobile and allow for things like mobile banking or mobile ticket purchasing. |
|
What is the difference between WWAN and WLAN and how does WWAN work? |
WWAN covers a larger area and use cellular networks to transfer data and information that is provided by Internet service providers 1.A mobile device which has a WWAN modem 2. connects to a base station that remits radio waves 3. the data is then sent to a mobile switching centre which then sends it to the correct ISP 4. The information is sent to the mobile device |
|
What is the difference between the Web and the Internet and what are other forms of communication infrastructures |
The web was created in 1989 which is a subset of the internet. The Web consists of sites and users that process the Hypertext Transfer Protocol (HTTP) and programs that implement are called browsers. (WWW) is a software not a network There is also things like Simple Mail transfer Protocol (SMTP) for sending and POP (Post office Program) to receive and File transfer protocol (FTP) |
|
What is the Internet? |
The internet is a network and comprised of network of networks uses different communication methods and conventions |
|
3 Important functions of the ISP and 2 types of speeds it uses |
1. Provides your computer or router with an internet Address 2. It serves as a gateway for the internet. The ISP receives the address from your router and than passes the information from the internet back to your router 3. the ISP helps pay for the internet by collecting money from their customers and pay access fees on your behalf Narrowband : less than 56kbps Broadband: more than 256Kbps |
|
What is a TLD, Domain Name, URL, and IP |
- The last letters in any domain name are referred to as TOP LEVEL DOMAIN which represents .CA .COM . ORG - Memorable names for internet resources - Uniform Resource Locator (URL) which is an easy to remember web address - an IP is a public address for every device on a network (There are public and private ones) |
|
What is a DNS, DNR and DN resolvers |
Is a Domain name system that converts human friendly website names into computer friendly web addresses. The DNS is a giant index that connects human address' to computer ones, and if the DNS doesn't work then addresses cannot be found unless you know the site number The process of switching between the two is is called the domain name resolution. and the Domain name resolvers are tasked with indexing |
|
what are the 3 different ways that home computers or small business connect to an ISP |
1. Regular telephone lines (Dial up) 2. Special telephone lines (DSL Line) 3. Cable TV line Modems are needed to convert digital computer data into analog waves before being sent, and they also convert from analog to digital when they receive it |
|
What are Dial up, (A,S)DSL, and Cable Modems |
Dial modems: Interfere with Telephone calls, and require calling ISP and can only process at 56kbps, when multiple users, they use the slowest data speeds DSL modems: Operates on same telephone lines, but doesn't interfere with phone signal, and are always connected to servers and faster data transmissions than dial up. Asymmetric DSL modems are mostly used in homes as they receive more data than transmitting it Symmetric DSL modems are used by bigger businesss or place that need to send and receive a lot of data. Cable Modem: Do not interfere with tv signal, very fast data transmission, they use fibre optic cables to run to neighbourhood distribution centre and run to subscriber |
|
What purposes are mobile devices for |
Collaboration and communication |
|
What are networks layers? and name each layer |
Transmission Control Protocol/Internet Protocol (TCP/IP)
(Application) Layer 4: provides protocols to allow different applications to communicate with each other and the user (Browsers, emails, FTP) (Internet, Transport) Layer 2+3=Used to communicate between different computers in the internet (network access)Layer 1: Used to transmit data within a single network (LAN) |
|
HOW TO ACCESS THE INTERNET AND HOW IT WORKS (URL, DOMAIN NAME, IP) (Layer 4) |
1. When we search sfu.ca we are identifying a location or address (Uniform Resource Locator) on the internet. The URL contains the domain name and a full path to the resource
2. The address is defined as an IP number. is a 4 byte value that is separated by periods and are given decimal numbers between (0-255) 3. The Domain name system will translate the Url to an IP number 4. (layer 4) Then we must use the help of the Hypertext Transfer Protocol to request the URL and receives normally the HTML 5. Now that we created the HTTP request we have to deliver it to the right address, which is the job of the TCP/IP |
|
HOW DOES THE TCP/IP SEND ITS DATA (LAYER 3) |
1. (LAYER 3): The TCP sends packets of data, by breaking down HTTP data units into 512Kbps sizes that are attached with sequence numbers, they are in charge of making sure it gets from the client to the server 2. the TCP is a Connection oriented protocol that makes sure to fix any errors, and resends any missing information |
|
HOW DOES THE TCP/IP SEND ITS DATA (LAYER 2) |
The main purpose of the IP is to transfer data packets across from computer to computer it sends packets of packets based off the IP and runs through gateways (Department, organization, city, country) |
|
HOW DOES THE TCP/IP SEND ITS DATA THROUGH PACKET SWITCHING |
Data is broken down into segments and segments into packages through the use of Packet assembler/dissasemble (PAD) The IP places that data at the front of the packet which is in front of the TCP segment data. The header informations shows the address, how many packets and packet order |
|
HOW DOES THE TCP/IP SEND ITS DATA THROUGH PACKET SWITCHING THROUGH WHOSE YOUR DADDY, UNTIL THEY ARE UNPACKED |
Packets are then sent through routers hitting different nodes and asking are you my daddy? if not then it gets sent to the next node and keeps going through until it hits the correct one. Once they reach the other end, they are disassembled by the PAD in order |
|
WHAT HAPPENS ONCE THE REQUEST IS RECEIVED AND RESPONDED |
Once the TCP and IP do their job the request lands at the site through the HTTP of the server, the response is then generated by the HTTP and is sent back to the sender with a small file containing the file of the URL. |
|
What is network externality? |
Network externality is the belief that the more users on a network, the more valuable it becomes to everyone (Network effect)
When the network hits the critical mass, it begins to explode and grow at a super rapid rate |
|
What are firewalls, port, ACL, and Packet filtering firewalls |
A computing device that prevents unauthorized network access and gets its name from forest fires. A port number is a uniquely decided to specific transactions over a network, and when a firewall is enabled, it stops any foreign access to that specific port number Access control list will keep track of which IP's are allowed to access the ports Packet Filtering firewalls: Are the simplest type of firewalls, it examines that packets that are being sent in and will decide whether or not to let it go through, best way is used by blocking social media sites in the workplace. |
|
What is encryption? and the 2 types |
It allows for clear text to turn into coded unlegible messages for secure storage or communication. A key is a number that encrypts the messages and creates an algorithm to code the original message. In symmetric encryption: There is only one key that is used to code and decode the message In Asymmetric encryption: There are different keys for locking and unlocking message. |
|
Whats the difference between HTTP and HTTPS and SSL |
HTTPS is data that is encrypted using a protocol called Secure Socket Layer (SSL) aka (TSL), they use the combination of private and public symmetric encryption. Both you and the website produce private and public keys that must be switched and shared with each other. |
|
What is a VPN and how does it work? |
They use public or private internet to create virtual private point to point network. A VPN client and a VPN server are needed to create a tunnel that only they can use, once the VPN server receives the message, they strip the address and decode the message for the Receiving user |
|
how does a search engine work? |
First search engine was named Archie. Search engines need require 2 things 1. Way to collect URL's 2. Method for storing/accessing the URLS so that they can be searched - Web crawlers/spiders go through the internet by starting with Seed URLs and go through information looking for hyperlinks that lead to more URLs to index Searching engine indexing: the at of organizing information retrieved from web crawlers and indexes them by putting them in specific sets of rules. |
|
WHAT PERCENTAGE OF INTERNET IS COVERED BY SEARCH ENGINES AND ORDER OF SEARCH RESULTS |
Search engines cover roughly 16 percent of the web. Search engines results are displayed most based of the relevance of the search query, so it'll read through its index and offer which one mostly relates to the query, and matches depend on Criteria used. Also it can be done advertising and selling top spots on search results. |