• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/84

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

84 Cards in this Set

  • Front
  • Back

COMPUTER NETWORK

TWO OR MORE COMPUTERS THAT SHARE RESOURCES

PEER-TO-PEER NETWORK P2P

ONE IN WHICH EACH COMPUTER IS CONSIDERED EQUAL. EACH DEVICE CAN SHARE ITS RESOURCES WITH EVERY OTHER DEVICE, AND THERE IS NO CENTRALIZED AUTHORITY

HOMEGROUP

CONSISTS OF COMPUTERS ON A HOME NETWORK RUNNING WINDOWS 7 OR LATER THAT ARE CONFIGURED WITH THE SAME HOMEGROUP INFORMATION

CLIENT-SERVER NETWORK

NETWORK THAT HAS AT LEAST ONE SERVER AT ITS CENTER

SERVER

MULTIUSER COMPUTER SYSTEM THAT RUNS A NETWORKING OPERATING SYSTEM AND PROVIDES SERVICES-SUCH AS INTERNET ACCESS, EMAIL, OR FILE AND PRINT SERVICES-TO CLIENT SYSTEMS

CLIENTS

PERSONAL COMPUTERS AND OTHER DEVICES THAT CONNECT TO THE SERVER

LOCAL AREA NETWORK (LAN)

NETWORK THAT HAS ALL CONNECTED DEVICES OR NODES LOCATED IN THE SAME PHYSICAL LOCATION

SWITCHES

CONNECTS DEVICES ON A LAN

PERSONAL AREA NETWORK (PAN)

SMALL NETWORK THAT CONSISTS OF DEVICES BY BLUETOOTH, SUCH AS A SMARTPHONE AND A COMPUTER

WIRELESS LAN OR WLAN

USES WIFI TO TRANSFER DATA

ETHERNET STNADARDS

DEFINE THE WAY DATA IS TRANSMITTED OVER A LOCAL AREA NETWORK

STANDARDS

SPECIFICATIONS THAT HAVE BEEN DEFINED BY AN INDUSTRY ORGANIZATION, WHICH ENSURES THAT EQUIPMENT THAT IS MADE BY DIFFERENT COMPANIES THAT WILL WORK TOGETHER

TOPOLOGY

PHYSICAL LAYOUT OF A LAN

BUS TOPOLOGY

NODES ARE CONNECTED USING A SINGLE CABLE

RING TOPOLOGY

DEVICES ARE CONNECTED BY A SINGLE CABLE BUT THE ENDS OF THE CABLE ARE CONNECTED IN A CIRCLE AND THE DATA TRAVELS AROUND THE CIRCLE IN ONE DIRECTION

STAR TOPOLOGY

EVERY NODE ON THE NETWORK IS ATTACHED TO A CENTRAL DEVICE, SUCH AS A SWITCH OR WIRELESS ACCESS POINT

WIDE AREA NETWORK (WAN)

A NETWORK THAT SPANS MULTIPLE LOCATIONS AND CONNECTS MULTIPLE LANS OVER DEDICATED LINES BY USING ROUTERS

ROUTER

DEVICE THAT CONNECTS TWO OR MORE NETWORKS TOGETHER

VIRTUAL PRIVATE NETWORK (VPN)

CREATES A PRIVATE NETWORK THOUGH THE PUBLIC NETWORK- THE INTERNET- ENABLING REMOTE USERS TO ACCESS A LAN SECURELY WITHOUT NEEDING DEDICATED LINES

ENTERPRISE NETWORK

LANS ARE CONNECTED TO EACH OTHER USING ROUTERS TECHNICALLY CREATING A WAN

METROPOLITAN AREA NETWORK (MAN)

NETWORK THAT COVERS A SINGLE GEOGRAPHIC AREA

CELLULAR NETWORK

USE CELL TOWERS TO TRANSMIT VOICE AND DATA OVER LARGE DISTANCES

STORAGE AREA NETWORK (SAN)

MOVES AND STORES INFORMATION BETWEEN DATA STORAGE DEVICES AND SERVERS ON A NETWORK MAKING THE DATA ACCESSIBLE TO ALL SERVERS IN THE SAN

NETWORK ADAPTER

COMMUNICATION DEVICE THAT ESTABLISHES A CONNECTION WITH A NETWORK

WIRELESS ADAPTER

CAN BE BUILT INTO A SMARTPHONE OR NOTEBOOK COMPUTER AND PROVIDES A CONNECTION TO THE CELLULAR NETWORK FOR NETWORK ACCESS

802.11 STANDARDS

ENSURE THAT DEVICES DEVELOPED BY DIFFERENT VENDORS WILL WORK WITH EACH OTHER

OPTICAL NETWORK TERMINAL (ONT)

DEVICE ON A NETWORK THAT CONNECTS TO THE INTERNET

AD HOC NETWORK

CREATED WHEN TWO WIRELESS DEVICES CONNECT TO EACH OTHER DIRECTLY

INFRASTRUCTURE WIRELESS NETWORK

DEVICES CONNECT THROUGH A WIRELESS ACCESS POINT

WIRELESS ACCESS POINT (WAP)

DEVICE THAT ENABLES WIRELESS DEVICES TO JOIN A WIFI NETWORK

FIREWALL

BLOCKS UNAUTHORIZED ACCESS TO A NETWORK

CLIENT FOR MICROSOFT NETWORKS

ENABLES A COMPUTER TO REMOTELY ACCESS FILES AND PRINTERS ON A MICROSOFT NETWORK

NETWORKING OPERATING SYSTEM (NOS)

MULTIUSER OPERATING SYSTEM THAT CONTROLS THE SOFTWARE AND HARDWARE THAT RUNS ON A NETWORK

DOMAIN

NETWORK COMPOSED OF A GROUP OF CLIENTS AND SERVERS UNDER THE CONTROL OF ONE CENTRAL SECURITY DATABASE ON A SPECIAL SERVER CALLED THE DOMAIN CONTROLLER

PROTOCOLS

DEFINE THE RULES FOR COMMUNICATION BETWEEN DEVICES

TCP/IP PROTOCOL STACK

SUITE OF PROTOCOLS THAT DEFINE MANY TYPES OF DATA MOVEMENT INCLUDING THE TRANSFER OF FILES AND WEBPAGES, SENDING AND RECEIVING, AND NETWORK CONFIGURATION

TRANSMISSION CONTROL PROTOCOL-TCP

RESPONSIBLE FOR ENSURING THAT DATA PACKETS ARE TRANSMITTED RELIABLY

INTERNET PROTOCOL-IP

RESPONSIBLE FOR ADDRESSING AND ROUTING PACKETS TO THIER DESTINATION

CYBERCRIME

CRIMINAL ACTIVITY ON THE INTERNET

PHISHING

USES EMAIL MESSAGES OR IMS THAT APPEAR TO BE FROM THOSE YOU DO BUSINESS WITH TO TRICK THE RECEIVER INTO REVEALING INFORMATION SUCH AS USERNAMES AND PASSWORDS FOR YOUR ACCOUNTS

PHARMING

REDIRECTS RECIPIENTS TO A PHONY WEBSITE

CLICKJACKING

LINK THAT, WHEN CLICKED, ENABLES MALWARE TO POST UNWANTED LINKS ON A SOCIAL NETWORKING PAGE

MALICIOUS SCRIPT

SCRIPT THAT WHEN EXECUTED CREATES A PAGES AND EVENTS OR SENDS SPAM EMAIL MESSAGES

COMPUTER FRAUD

SCHEME THAT CONVINCES VICTIMS TO VOLUNTARILY AND KNOWINGLY GIVE MONEY OR PROPERTY TO A PERSON

IDENTITY THEFT

OCCURS WHEN SOMEONE USES YOUR NAME, SOCIAL SECURITY NUMBER, OR BANK CREDIT CARD NUMBER FRAUDENTLY

KEYLOGGERS

PASSWORD-STEALING SOFTWARE THAT CAPTURE WHAT IS TYPED ON A KEYBOARD

HACKING

THE ACT OF GAINING UNAUTHORIZED ACCESS TO A COMPUTER SYSTEM OR NETWORK

HACKTIVISM

HACKING MAKE A POLITICAL STATEMENT

CYBERTERRORISM

AN UNLAWFUL ATTACK AGAINST COMPUTERS OR NETWORKS TO INTIMIDAT A GOVERNMENT OR ITS PEOPLE FOR A POLITICAL OR SOCIAL AGENDA

MALWARE

MALICIOUS SOFTWARE THAT INCLUDES DIFFERENT TYPES OF PROGRAMS THAT ARE DESIGNED TO BE HARMFUL OR MALICIOUS

SPAMMING

SENDING MASS, UNSOLICITED EMAIL MESSAGES

COOKIE

SMALL TEXT FILE MANY WEBSITES PUT ON A COMPUTER WHEN VISITED

ADWARE

ONE OF THE MOST ANNOYING FORMS OF MALWARE THAT SHOWS ADS USUALLY IN THE FORM OF POP-UPS OR BANNER ADS ON WEBSITES OR IN SOFTWARE

SPYWARE

FORM OF MALWARE THAT SECRETLY GATHERS PERSONAL INFORMATION

BROWSER HIJACKER

SPYWARE THAT CHANGES YOUR HOME PAGE AND REDIRECTS YOU TO OTHER WEBSITES

COMPUTER VIRUS

PROGRAM THAT REPLICATES ITSELF AND INFECTS COMPUTERS

VIRUS HOAXES

TRICK YOU INTO BEHAVIOR THAT CAN BE HARMFUL, SUCH AS SEARCHING FOR AND DELETING FILES THAT COMPUTER ACTUALLY NEEDS

LOGIC BOMB

BEHAVES LIKE A VIRUS IN THAT IT PERFORMS A MALICIOUS ACT SUCH AS DELETING FILES

TIME BOMB

WHEN A LOGIC BOMB TRIGGERED BY A SPECIFIC DATE AND TIME

WORM

SELF-REPLICATING BUT DOES NOT NEED A HOST TO TRAVEL

BOTNET

COMPUTER ZOMBIES OR BOTS CONTROLLED BY A MASTER

DENIAL-OF-SERVICE ATTACK (DOS)

PERPETRATED BY SENDING OUT SO MUCH TRAFFIC BUT IT CRIPPLES A SERVER OR NETWORK

TROJAN HORSE

PROGRAM THAT APPEARS TO BE LEGITIMATE BUT IS ACTUALLY MALICIOUS

ROOTKIT

SET OF PROGRAMS THAT ENABLES SOMEONE TO GAIN CONTROL OVER A COMPUTER SYSTEM WHILE HIDIN THE FACT THAT THE COMPUTER JAS BEEN COMPROMISED

ANTIVIRUS SOFTWARE

SCANS FILES ON A COMPUTER, CALLED SIGNATURE CHECKING, TO SEARCH KNOWN VIRUSES

ANTISPYWARE SOFTWARE

PREVENTS ADWARE AND SPYWARE SOFTWARE FROM INSTALLING ITSELF ON A COMPUTER

SECURITY SUITES

PACKAGES OF SECURITY SOFTWARE THAT INCLUDE A COMBINATION OF FEATURES

SERVICE SET IDENTIFIER (SSID)

WIRELESS NETWORK NAME OF A WIRELESS ROUTER

WIRELESS ENCRYPTION

ADDS SECURITY TO A WIRELESS NETWORK BOY ENCRYPTING TRANSMITTED DATA

WIFI PROTECTED SETUP (WPS)

A WAY TO AUTOMATICALLY CONFIGURE DEVICES TO CONNECT TO A NETWORK BY USING A BUTTON, A PERSONAL IDENTIFICATION NUMBER (PIN) OR A USB KEY

PIGGYBACKING

MEANS USING ANOPEN WIRELESS NETWORK TO ACCESS THE INTERNET WITHOUT PERMISSION

WARDRIVING

MEANS DRIVING AROUND AND LOCATING OPEN WIRELESS ACCESS POINTS

ADMINISTRATOR ACCOUNT

FOR MAKING CHANGES, INSTALLING SOFTWARE, CONFIGURING SETTINGS, AND COMPLETING OTHER TASKS

STANDARD ACCOUNT

FOR EVERYDAY COMPUTING

GUEST ACCOUNT

FOR USERS WHO NEED TEMPORARY ACCESS TO A SYSTEM

USER ACCOUNT CONTROL (UAC)

NOTIFIES USERS BEFORE CHANGES ARE MADE ON A WINDOWS COMPUTER

PASSWORD MANAGER

STORES PASSWORDS AND CAN ALSO BE USED TO GENERATE PASSWORDS THAT ARE MORE SECURE BECAUSE THEY ARE RANDOMLY GENERATED

KEYCHAIN

A FEATURE IN OS X THAT STORES VARIOUS PASSWORDS AND PASSPHRASES IN PLACE AND MAKES THEM ACCESSIBLE THROUGH A MASTER PASSWORD

BIOMETRIC SCANNERS

MEASURE HUMAN CHARACTERISTICS, SUCH AS FINGERPRINTS, RETINAS, OR VOICE PATTERNS FOR VERIFICATION

ENCRYPTION

CONVERTS UNENCRYPTED, PLAIN TEXT INTO CODE CALLED CIPHERTEXT

ENCRYPTING FILE SYSTEM (EFS)

FEATURE INCLUDED IN WINDOWS THAT ENABLES THE ENCRYPTION OF INDIVIDUAL FILES

BITLOCKER

FEATURE INCLUDED IN WINDOWS THAT ENABLES THE ENCRYPTION OF AN ENTIRE DRIVE

FILEVAULT

SIMILAR FEATURE IN OS X THAT ENCRYPTS THE CONTENTS OF THE HARD DISK

ACCEPTABLE USE POLICY (AUP)

IS A POLICY MANY BUSINESSES AND SCHOOLS HAVE BY WHICH COMPUTER AND NETWORK USERS MUS ABIDE