Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Year 7 Networking

Year 7 Networking unit

Bits Any pair of opposites, e.g. On/Off.
BYTE 8 Bits strung together.
Bandwidth The maximum transmission capacity of a device, measured by bit rate.
Bitrate The number of bits per second a system can transmit.
Fiber optic cable A network cable that contains strands of glass fibers and uses light to transmit data.
Wireless network A local-area network (LAN) that uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications.
Wired network A local-area network (LAN) that connects devices to the Internet or other network using cables. This network commonly uses cables connected to Ethernet ports on the network router on one end and to a computer or other device on the cable's opposite end.
Mobile network Also referred to as a cellular network, employs the use of radio frequencies that can be used simultaneously by several callers at one and the same time.
Internet Protocol (IP) A unique address written using a set of numbers organised in a particular way to identify each device on the network.
Internet service provider (ISP) A company that provides customers with Internet access.
A Protocol A well-known set of rules and standards used to communicate between machines.
Domain Name System (DNS) an Internet service that translates website names into IP addresses. The website names are alphabetic, as they're easier to remember. The Internet however, is really based on IP addresses.
DNS spoofing A type of cyberattack, when an attacker hacks into a server and changes the domain name to match with a wrong IP address and sends people to an imposter website.
Router A piece of computer hardware that acts as traffic managers to keep information packets moving efficiently over the Internet.
The Internet A global wide area network (WAN) that connects computer systems across the world.
Web browser The application you use to access and view the web pages from your device.
Uniform Resource Locator (URL) An address that identifies a particular webpage on the Internet.
Hypertext Transfer Protocol (HTTP) A protocol used on the WWW to communicate between web browsers and the server in order to transfer data.
HTML (Hypertext Markup Language) The code that controls the structure of content on webpages.
COOKIES ID cards sent from a website and stored on the user's device by the user's web browser so the next time you visit that site it will know who you are and load correct pages.
SSL and TLS A layer of security that provides secure channel for your online communications and protects you from hackers, by checking that a website has an authentic digital certificate.
Encryption It's a way of scrambling or changing a message to hide it and keep it secure from unwanted receivers.
Decryption It's a way of unscrambling the message to make it readable.
Algorithm A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Symmetric encryption A form of encryption where a sender and a receiver share the same key used to encrypt and decrypt a message. The key has to be agreed on ahead in private.
Asymmetric encryption A form of encryption where different keys are used for encrypting and decrypting messages. It uses two keys, a public and a private key.
Cybercrime An act when someone is exploiting vulnerabilities in hardware and software to steel, compromise information or hack and hijack equipment.
Computer virus A program that gets installed usually unintentionally and harms the computer, it can often spread to other computers.
Distributed Denial of Service (DDoS) When a virus affects millions of computers worldwide and creates a BOT NET (digital bomb) to attack and take down websites. This is achieved by the hackers overwhelming a website with too many requests.
Phishing scam The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Transmission Control Protocol (TCP) A network protocol that manages the sending and receiving of all your data. Its role is to do an inventory to see if all packets have been received.
Latency Time it takes for a bit to travel from its sender to its receiver.
ASCII Code standard for information interchange that is the universally recognized as raw text format that any computer can understand.
Network redundancy Having multiple backups to ensure reliability during cases of high usage or failure
Abstraction Reducing information and detail to focus on essential characteristics.
Server A computer that awaits and responds to requests for data.
Client A computer that requests data stored on a server.
Firewall Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Created by: mgl