Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Literacy

Quiz Prep

QuestionAnswer
What are the 3 types of P2PNet? 1. Wired ethernet2. Wireless ethernet3. Powerline net
What is a packet sniffer? A program that looks at each packet as it travels on the internet, for hackers.
How long can ethernet utp cables run? 328 feet
What is the max range of wireless devices? 250 feet
What is the most popular transmission media option for wired ethernet nets? utpunshielded twisted pair
How long can utp cables run with repeaters? 600 feet
What is Trojan Horse? A program that appears to be useful but does something malicious.
What does SSID do? Service Set Identifiera default network name for routers
How are data transfer rates and throughtput measured in? megabits per secondmbps
What is a peer-to-peer network? A local network the most common where nodes can connect to each other and communicate
What are black-hat hackers? Hackers that hack for criminal reasons
What is a router? Navigation device that transfers data between two or more networks
Can linux use P2P networks? yes
What are boot sector viruses? Viruses that replicate themselves into the Master Boot Record of a hard drive
Is a utp cable difficult to install? No more difficult to install than a phone cable
What are examples of NOS (Network Operating System)? 1. Windows Vista Enterprise2. Windows XP Professional3. Windows Server 20034. Novell Netware
What are two ways networks are run? locally and centrally
What is a Master Boot Record? A program that executes whenever a computer boots up, ensuring virus will be loaded into memory immediately.
What are logic bombs? Viruses thatare triggered when certain logical condiditons are met (like opening files)
What 802-11 standard came out in 2008? 802.11n
What network is used by common versions of Windows? P2P
What are time bombs? Viruses that are triggered at a certain time or date.
What are zombies? Computers that hackers have almost complete control over.
Nodes on P2P networks are called what? peers
What are script? Series of commands and mine programs that execute without your knowledge.
What is a computer network? Two or more computers connected
What are macro viruses? Viruses that attach to documents such as Word and Excel that use macros.
What are the 3 groups that viruses are classified as? Polymorphic virusesMultipartite virusesSelf viruses
What is DoS? Denial of Service attack
What are Polymorphic viruses? Viruses that periodically change their own codes to avoid detection.
What are normal telephone wires called? Twisted pair cable (made out of copper)
What is the world's largest network? The internet
What are switches? Traffic cops than send data to the right node.
What is the 802.11 wireless standard also called? wi-fi
Which virus usually affects only one certain type of file? Polymorphic viruses!
What are multipartite viruses? Viruses designed to infect multiple file types
What is the cable that connecgts to a cable tv or cable box? coaxial cable (single wire)
What standard is currently based for wireless networks in the US? 802.11 standard
What does DDoS mean? Distributed Denial of Service attack
Can client/server networks be configured for home use? yes
What are nodes? Devices that are connected to a network
What is a Logical Port? A virutal gateway.
What is the throughput? The actual speed of data transfer.
What is data transfer rate also called? bandwidth
What are self viruses? Viruses that temporarily erase their codes from files in order to hide in the computer
How often should you run a virus check? At least once a week
What are fiber-optic cables made of? Plastic or glass fibers
What are white-hat hackers? Hackers that break into computers for the challenge and not to steal or wreak havoc to systems
What is an administered network? It refers to the way a network is run
What are some popular firewalls? Norton (personal firewall)McAfee (firewall)ZoneAlarmBlackICE PC protection
What are the three 802.11 standards currently used? 802.11a802.11b802.11g802.11n
What are worms? Different than viruses they travel between systems through networks
What are encrypton viruses? The newes and form of virus that searches for common data files
What are script kiddies? Hackers that don't use sophisticated equipment to hack computers
What is the data transfer rate and bandwidth? They are the max speed at which data can be transmitted between nodes.
What are smart agents? Firewall programs that automatically stop attacks.
What are some manufacgturers that make routers that double as firewalls? LinksysD-LinkNetgear
What are 6 things you should do when securing a wireless network? 1. Change network name2. Disable SSID Broadcast3. Change default password on router4. Turn on security protocals5. Implement media access control6. Apply firmware upgrades
What are network interface cards? (NIC's) Adapters installed in the computers and peripherals as expansion cards.
How are nodes connected to each other and to the network? Transmission media
Created by: luisgarcia
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards