• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
Collaboration
Occurs when two or more people work together to achieve a common goal. Driven by four critical factors: Communication skills and culture, communication systems, content management, and workflow control.

Network Externality (Network Effect)

The phenomenon in which the larger the network, the more valuable a network becomes

Network

Collection of computers that transmit and/ or receive electronic signals through transmission media

Transmission Media

May be a physical media such as cable or glass fibre cable, or wireless media such as light or radio frequencies

Protocol

Set of procedures used in transmission between networks

Local Area Network (LAN)

Connects computers within a small, single geographical location

Wide Area Network (WAN)

Connect computers at different geographical locations

Internet

Network of networks

Switch

A special purpose computer that receives and transmits messages on the LAN

Network Interface Card (NIC)

Hardware component that connects the device's circuitry to the network cable

Media Access Control (MAC) Address

The unique identifier in which each NIC has

Unshielded Twisted Pair (UTP) Cable

Connections made using these cables; twisting the cables substantially reduces cross-wire signal interference

Optical Fibre Cable

Cladded cables that uses light ray signals

Institute for Electrical and Electrical Engineers (IEEE)

Most used protocol for LAN network; IEEE 802.3 for LAN or Ethernet; IEEE 802.11 for wireless

Wireless NIC (WNIC)

Lets a user move around and stay connected to their network without having to plug-in with a cable (WiFi)

Access Points

Access points for wireless LANs to connect to

Router

Special-purpose computers that implement the protocol for WANs

Internet Service Providers (ISP)

Provides your computer or router with legitimate IP Address, serves as a gateway to the Internet

Hypertext Transfer Protocol (HTTP)

the Web, a subset of the Internet, consists of sites and users that process HTTP

Simple Mail Transfer Protoocl (SMTP)

protocol in which you send mails on to POP

File Transfer Protocol (FTP)

Protocol in which you transfer files with

Top Level Domain (TLD)

the ".com"

Internet Corporation for Assigned Names and Numbers (ICANN)

the other part of a URL (Uniform Resource Locator), which is the whole address)

Domain Name System (DNS)

Service that converts human-friendly URLs into computer friendly IP addresses

Modem

Performs conversions of analog or wavy signals; DSL is dial up; DSL Modem operates on the same lines of voice telephones

Asymmetric Digital Subscription (ADSL) & Symmetric Digital Subscription (SDSL)

Lower upload speed than download speed; same rate for upload and download

Cable Modem

Modem that uses the TV signals

Narrowband/ Broadband

Narrowband is dial-up with 56 kbps; Broadband is DSL with 256 kbps

Wireless WAN (WWAN)

Telephone companies

Transmission Control Program/ Internet Protocol (TCP/IP)
Four layered network scheme by IETF which consists of:
1) Network Access Layer
2) Internet Layer
3) Transport Layer
4) Application Layer

TCP controls data packets
IP is responsible for moving packets

Firewall

Computer device that prevents unauthorized network access; ACL manages which IP addresses are allowed

Encryption

The process of transforming clear text into coded, unintelligible text to secure storage or communication

Virtual Private Network (VPN)
Uses the internet or private internet to create the appearance of private point-to-point connections; uses a tunnel to send encrypted message which is then decrypted

Web Crawler/ Web Spider

Method in which search engine finds its designated content