Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
84 Cards in this Set
- Front
- Back
COMPUTER NETWORK |
TWO OR MORE COMPUTERS THAT SHARE RESOURCES |
|
PEER-TO-PEER NETWORK P2P |
ONE IN WHICH EACH COMPUTER IS CONSIDERED EQUAL. EACH DEVICE CAN SHARE ITS RESOURCES WITH EVERY OTHER DEVICE, AND THERE IS NO CENTRALIZED AUTHORITY |
|
HOMEGROUP |
CONSISTS OF COMPUTERS ON A HOME NETWORK RUNNING WINDOWS 7 OR LATER THAT ARE CONFIGURED WITH THE SAME HOMEGROUP INFORMATION |
|
CLIENT-SERVER NETWORK |
NETWORK THAT HAS AT LEAST ONE SERVER AT ITS CENTER |
|
SERVER |
MULTIUSER COMPUTER SYSTEM THAT RUNS A NETWORKING OPERATING SYSTEM AND PROVIDES SERVICES-SUCH AS INTERNET ACCESS, EMAIL, OR FILE AND PRINT SERVICES-TO CLIENT SYSTEMS |
|
CLIENTS |
PERSONAL COMPUTERS AND OTHER DEVICES THAT CONNECT TO THE SERVER |
|
LOCAL AREA NETWORK (LAN) |
NETWORK THAT HAS ALL CONNECTED DEVICES OR NODES LOCATED IN THE SAME PHYSICAL LOCATION |
|
SWITCHES |
CONNECTS DEVICES ON A LAN |
|
PERSONAL AREA NETWORK (PAN) |
SMALL NETWORK THAT CONSISTS OF DEVICES BY BLUETOOTH, SUCH AS A SMARTPHONE AND A COMPUTER |
|
WIRELESS LAN OR WLAN |
USES WIFI TO TRANSFER DATA |
|
ETHERNET STNADARDS |
DEFINE THE WAY DATA IS TRANSMITTED OVER A LOCAL AREA NETWORK |
|
STANDARDS |
SPECIFICATIONS THAT HAVE BEEN DEFINED BY AN INDUSTRY ORGANIZATION, WHICH ENSURES THAT EQUIPMENT THAT IS MADE BY DIFFERENT COMPANIES THAT WILL WORK TOGETHER |
|
TOPOLOGY |
PHYSICAL LAYOUT OF A LAN |
|
BUS TOPOLOGY |
NODES ARE CONNECTED USING A SINGLE CABLE |
|
RING TOPOLOGY |
DEVICES ARE CONNECTED BY A SINGLE CABLE BUT THE ENDS OF THE CABLE ARE CONNECTED IN A CIRCLE AND THE DATA TRAVELS AROUND THE CIRCLE IN ONE DIRECTION |
|
STAR TOPOLOGY |
EVERY NODE ON THE NETWORK IS ATTACHED TO A CENTRAL DEVICE, SUCH AS A SWITCH OR WIRELESS ACCESS POINT |
|
WIDE AREA NETWORK (WAN) |
A NETWORK THAT SPANS MULTIPLE LOCATIONS AND CONNECTS MULTIPLE LANS OVER DEDICATED LINES BY USING ROUTERS |
|
ROUTER |
DEVICE THAT CONNECTS TWO OR MORE NETWORKS TOGETHER |
|
VIRTUAL PRIVATE NETWORK (VPN) |
CREATES A PRIVATE NETWORK THOUGH THE PUBLIC NETWORK- THE INTERNET- ENABLING REMOTE USERS TO ACCESS A LAN SECURELY WITHOUT NEEDING DEDICATED LINES |
|
ENTERPRISE NETWORK |
LANS ARE CONNECTED TO EACH OTHER USING ROUTERS TECHNICALLY CREATING A WAN |
|
METROPOLITAN AREA NETWORK (MAN) |
NETWORK THAT COVERS A SINGLE GEOGRAPHIC AREA |
|
CELLULAR NETWORK |
USE CELL TOWERS TO TRANSMIT VOICE AND DATA OVER LARGE DISTANCES |
|
STORAGE AREA NETWORK (SAN) |
MOVES AND STORES INFORMATION BETWEEN DATA STORAGE DEVICES AND SERVERS ON A NETWORK MAKING THE DATA ACCESSIBLE TO ALL SERVERS IN THE SAN |
|
NETWORK ADAPTER |
COMMUNICATION DEVICE THAT ESTABLISHES A CONNECTION WITH A NETWORK |
|
WIRELESS ADAPTER |
CAN BE BUILT INTO A SMARTPHONE OR NOTEBOOK COMPUTER AND PROVIDES A CONNECTION TO THE CELLULAR NETWORK FOR NETWORK ACCESS |
|
802.11 STANDARDS |
ENSURE THAT DEVICES DEVELOPED BY DIFFERENT VENDORS WILL WORK WITH EACH OTHER |
|
OPTICAL NETWORK TERMINAL (ONT) |
DEVICE ON A NETWORK THAT CONNECTS TO THE INTERNET |
|
AD HOC NETWORK |
CREATED WHEN TWO WIRELESS DEVICES CONNECT TO EACH OTHER DIRECTLY |
|
INFRASTRUCTURE WIRELESS NETWORK |
DEVICES CONNECT THROUGH A WIRELESS ACCESS POINT |
|
WIRELESS ACCESS POINT (WAP) |
DEVICE THAT ENABLES WIRELESS DEVICES TO JOIN A WIFI NETWORK |
|
FIREWALL |
BLOCKS UNAUTHORIZED ACCESS TO A NETWORK |
|
CLIENT FOR MICROSOFT NETWORKS |
ENABLES A COMPUTER TO REMOTELY ACCESS FILES AND PRINTERS ON A MICROSOFT NETWORK |
|
NETWORKING OPERATING SYSTEM (NOS) |
MULTIUSER OPERATING SYSTEM THAT CONTROLS THE SOFTWARE AND HARDWARE THAT RUNS ON A NETWORK |
|
DOMAIN |
NETWORK COMPOSED OF A GROUP OF CLIENTS AND SERVERS UNDER THE CONTROL OF ONE CENTRAL SECURITY DATABASE ON A SPECIAL SERVER CALLED THE DOMAIN CONTROLLER |
|
PROTOCOLS |
DEFINE THE RULES FOR COMMUNICATION BETWEEN DEVICES |
|
TCP/IP PROTOCOL STACK |
SUITE OF PROTOCOLS THAT DEFINE MANY TYPES OF DATA MOVEMENT INCLUDING THE TRANSFER OF FILES AND WEBPAGES, SENDING AND RECEIVING, AND NETWORK CONFIGURATION |
|
TRANSMISSION CONTROL PROTOCOL-TCP |
RESPONSIBLE FOR ENSURING THAT DATA PACKETS ARE TRANSMITTED RELIABLY |
|
INTERNET PROTOCOL-IP |
RESPONSIBLE FOR ADDRESSING AND ROUTING PACKETS TO THIER DESTINATION |
|
CYBERCRIME |
CRIMINAL ACTIVITY ON THE INTERNET |
|
PHISHING |
USES EMAIL MESSAGES OR IMS THAT APPEAR TO BE FROM THOSE YOU DO BUSINESS WITH TO TRICK THE RECEIVER INTO REVEALING INFORMATION SUCH AS USERNAMES AND PASSWORDS FOR YOUR ACCOUNTS |
|
PHARMING |
REDIRECTS RECIPIENTS TO A PHONY WEBSITE |
|
CLICKJACKING |
LINK THAT, WHEN CLICKED, ENABLES MALWARE TO POST UNWANTED LINKS ON A SOCIAL NETWORKING PAGE |
|
MALICIOUS SCRIPT |
SCRIPT THAT WHEN EXECUTED CREATES A PAGES AND EVENTS OR SENDS SPAM EMAIL MESSAGES |
|
COMPUTER FRAUD |
SCHEME THAT CONVINCES VICTIMS TO VOLUNTARILY AND KNOWINGLY GIVE MONEY OR PROPERTY TO A PERSON |
|
IDENTITY THEFT |
OCCURS WHEN SOMEONE USES YOUR NAME, SOCIAL SECURITY NUMBER, OR BANK CREDIT CARD NUMBER FRAUDENTLY |
|
KEYLOGGERS |
PASSWORD-STEALING SOFTWARE THAT CAPTURE WHAT IS TYPED ON A KEYBOARD |
|
HACKING |
THE ACT OF GAINING UNAUTHORIZED ACCESS TO A COMPUTER SYSTEM OR NETWORK |
|
HACKTIVISM |
HACKING MAKE A POLITICAL STATEMENT |
|
CYBERTERRORISM |
AN UNLAWFUL ATTACK AGAINST COMPUTERS OR NETWORKS TO INTIMIDAT A GOVERNMENT OR ITS PEOPLE FOR A POLITICAL OR SOCIAL AGENDA |
|
MALWARE |
MALICIOUS SOFTWARE THAT INCLUDES DIFFERENT TYPES OF PROGRAMS THAT ARE DESIGNED TO BE HARMFUL OR MALICIOUS |
|
SPAMMING |
SENDING MASS, UNSOLICITED EMAIL MESSAGES |
|
COOKIE |
SMALL TEXT FILE MANY WEBSITES PUT ON A COMPUTER WHEN VISITED |
|
ADWARE |
ONE OF THE MOST ANNOYING FORMS OF MALWARE THAT SHOWS ADS USUALLY IN THE FORM OF POP-UPS OR BANNER ADS ON WEBSITES OR IN SOFTWARE |
|
SPYWARE |
FORM OF MALWARE THAT SECRETLY GATHERS PERSONAL INFORMATION |
|
BROWSER HIJACKER |
SPYWARE THAT CHANGES YOUR HOME PAGE AND REDIRECTS YOU TO OTHER WEBSITES |
|
COMPUTER VIRUS |
PROGRAM THAT REPLICATES ITSELF AND INFECTS COMPUTERS |
|
VIRUS HOAXES |
TRICK YOU INTO BEHAVIOR THAT CAN BE HARMFUL, SUCH AS SEARCHING FOR AND DELETING FILES THAT COMPUTER ACTUALLY NEEDS |
|
LOGIC BOMB |
BEHAVES LIKE A VIRUS IN THAT IT PERFORMS A MALICIOUS ACT SUCH AS DELETING FILES |
|
TIME BOMB |
WHEN A LOGIC BOMB TRIGGERED BY A SPECIFIC DATE AND TIME |
|
WORM |
SELF-REPLICATING BUT DOES NOT NEED A HOST TO TRAVEL |
|
BOTNET |
COMPUTER ZOMBIES OR BOTS CONTROLLED BY A MASTER |
|
DENIAL-OF-SERVICE ATTACK (DOS) |
PERPETRATED BY SENDING OUT SO MUCH TRAFFIC BUT IT CRIPPLES A SERVER OR NETWORK |
|
TROJAN HORSE |
PROGRAM THAT APPEARS TO BE LEGITIMATE BUT IS ACTUALLY MALICIOUS |
|
ROOTKIT |
SET OF PROGRAMS THAT ENABLES SOMEONE TO GAIN CONTROL OVER A COMPUTER SYSTEM WHILE HIDIN THE FACT THAT THE COMPUTER JAS BEEN COMPROMISED |
|
ANTIVIRUS SOFTWARE |
SCANS FILES ON A COMPUTER, CALLED SIGNATURE CHECKING, TO SEARCH KNOWN VIRUSES |
|
ANTISPYWARE SOFTWARE |
PREVENTS ADWARE AND SPYWARE SOFTWARE FROM INSTALLING ITSELF ON A COMPUTER |
|
SECURITY SUITES |
PACKAGES OF SECURITY SOFTWARE THAT INCLUDE A COMBINATION OF FEATURES |
|
SERVICE SET IDENTIFIER (SSID) |
WIRELESS NETWORK NAME OF A WIRELESS ROUTER |
|
WIRELESS ENCRYPTION |
ADDS SECURITY TO A WIRELESS NETWORK BOY ENCRYPTING TRANSMITTED DATA |
|
WIFI PROTECTED SETUP (WPS) |
A WAY TO AUTOMATICALLY CONFIGURE DEVICES TO CONNECT TO A NETWORK BY USING A BUTTON, A PERSONAL IDENTIFICATION NUMBER (PIN) OR A USB KEY |
|
PIGGYBACKING |
MEANS USING ANOPEN WIRELESS NETWORK TO ACCESS THE INTERNET WITHOUT PERMISSION |
|
WARDRIVING |
MEANS DRIVING AROUND AND LOCATING OPEN WIRELESS ACCESS POINTS |
|
ADMINISTRATOR ACCOUNT |
FOR MAKING CHANGES, INSTALLING SOFTWARE, CONFIGURING SETTINGS, AND COMPLETING OTHER TASKS |
|
STANDARD ACCOUNT |
FOR EVERYDAY COMPUTING |
|
GUEST ACCOUNT |
FOR USERS WHO NEED TEMPORARY ACCESS TO A SYSTEM |
|
USER ACCOUNT CONTROL (UAC) |
NOTIFIES USERS BEFORE CHANGES ARE MADE ON A WINDOWS COMPUTER |
|
PASSWORD MANAGER |
STORES PASSWORDS AND CAN ALSO BE USED TO GENERATE PASSWORDS THAT ARE MORE SECURE BECAUSE THEY ARE RANDOMLY GENERATED |
|
KEYCHAIN |
A FEATURE IN OS X THAT STORES VARIOUS PASSWORDS AND PASSPHRASES IN PLACE AND MAKES THEM ACCESSIBLE THROUGH A MASTER PASSWORD |
|
BIOMETRIC SCANNERS |
MEASURE HUMAN CHARACTERISTICS, SUCH AS FINGERPRINTS, RETINAS, OR VOICE PATTERNS FOR VERIFICATION |
|
ENCRYPTION |
CONVERTS UNENCRYPTED, PLAIN TEXT INTO CODE CALLED CIPHERTEXT |
|
ENCRYPTING FILE SYSTEM (EFS) |
FEATURE INCLUDED IN WINDOWS THAT ENABLES THE ENCRYPTION OF INDIVIDUAL FILES |
|
BITLOCKER |
FEATURE INCLUDED IN WINDOWS THAT ENABLES THE ENCRYPTION OF AN ENTIRE DRIVE |
|
FILEVAULT |
SIMILAR FEATURE IN OS X THAT ENCRYPTS THE CONTENTS OF THE HARD DISK |
|
ACCEPTABLE USE POLICY (AUP) |
IS A POLICY MANY BUSINESSES AND SCHOOLS HAVE BY WHICH COMPUTER AND NETWORK USERS MUS ABIDE |