• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

b wireless

2.4 freq


long dist


slow speed

a wireless

5.0 freq


short dist


fast speed

g wireless

2.4 freq

long dist


fast speed


compatible with b



n wireless

2.4 and 5.0 freq

very long dist


very fast speed


bluetooth

not secure

short dist


only connect to 1


20-30 feet


high battery life



kat 5 cable
copper, 8 small copper wires




coax cable

big chunk of copper with foil sheild



fiberoptic cable

pulses of light on a glass filament



wireless.

electromagnetic waves



interference in transmisison

copper is twisted to prevent it

little to no interference on fiber


lots of interference in wireless (microwave)




pop3

traditional

need a local client


emails saved on your hard drive


no remote access




IMAP

can access your emails anywhere

internet browser access


SMTP

transfers your mail from the mail server to your computer and vice versa.

encryption

gives the user's file confidentiality

types of encryption

substitution

transposition


AES


negatives to encryption

takes time

not convenient


more power used


user account control

need admin to enter password when a non admin user is on the computer. can help to protect against malware. gives you more security.

compression

converts repeating characters into a single variable. makes the file size smaller so it is easier to send.


we dont compress everything because

it would take a lot of time to decompress everything.

what is a driver

a program that allows the PC to communicate with the device or piece of hardware



plug and play

anything that is plugged into the computer via USB will install a driver immediately so you are able to use the device instantly

Manufacturer vs Windows drivers

Manufacturer drive will give you full access to the device

Windows driver


Virus

cannot self-replicate to other systems without human intervention



worm

network

self-replicating




trojan

installed in the background of legit installation



macro

within Microsoft Office (.doc, .docx., word, excel, .pdf)

root kit

establishes itself before the operating system is loaded

keylogger

captures every single key that you type on the keyboard.

windows updates

updates all windows programs. (java, web browsers, flash, drivers)

Windows firewall

keeps bad things from entering your computer by monitoring ports.



dns

domain name system. translates domain name into IP address and vice versa

dhcp

automatically sets all IP config elements

5 elements of ip config

ip address

subnet mask


default gateway


DNS 1


DNS 2


ip address

tells which computer it is (unique)


subnet mask

tells which network you are on

default gateway

destination for all traffic that is not local


usually the router



DNS 1 and DNS 2

allows you to go to URLs you dont already know

drive by download

a malicious program that is automatically downloaded to your computer without your consent. can be downloaded by visiting a website or clicking on a malicious URL.

spear phishing

tricks the user to click on a malicious URL by presenting something to the user that they would be interested in clicking on.