Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CIS FINAL

QuestionAnswer
Describes a process in which two or more computers or devices transfer data, instructions, and information. Communications
People connect wirelessly to the internet through a ___________________ using mobile computers or other devices. Wireless Internet Access Point
work on line is also known as collaborating
A navigation system that cdonsists of one or more earth-based recievers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location. Global Positioning System (GPS)
Software that helps groups of people work together on projects and share information over a network. Groupware
A collection of computers and devices connected together via communications devices and transmission media. Network
A network that connects computers and devices in a limited geographical area such as a home school computer lab, office buildings or closely positioned group of buildings. Local Area Network (LAN)
A LAN that uses no physical wires. Wireless Lan (WLAN)
A high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across the region. Metropolitan Area Network (MAN)
A network that covers a large geographic area using a communications channel that combines many types of media such as telephone lines, cables and radio waves. Wide Area Network (WAN)
One or more computers act as a server and the other computers on the network request services from the server. Client/Server network
Sometimes called a host computer, controls access to the hardware, software and other resources on the network and provides a centralized stroage area for programs, data and info. Server
Other computers and mobile devices on the network that rely on the server for its resources. Clients
A simple, inexpensive network that typically connects fewer that 10 computers. Peer to Peer
Refers to the layout of the computers and devices in a communications network. Network topology
A network that consists of a single central cable, to which all computers and other devices connect. Bus Network
A network where a cable forms a closed loop with all computers and devices arranged along the ring. Ring Network
Specifies computers and devices on the network share or pass a special signal, called a token, in a unidirectional manner and in a preset order. Token Ring
A network standard, specifically a protocol, that defines how messages are routed from one end of a network to the other, ensuring the data arrives correctly. TCP/IP
A standard specifically a protocol, that defines how a network usues radio signals to communicate with a tag placed in or attached to an object, animal or person. RFID (Radio frequency identification)
Any of several types of long distance digital telephone lines that carry multiple signals over a single communications line. T-Carrier line
The amount of data, instructions, and info that can travel over a communications channel Bandwidth
An electrical disturbance that can degrade communications Noise
The process of comparing data with a set of rules or values to find out if the data is correct. Validation
A window on the screen that provides areas sfor entering or changing data in a database. Form
Any event or action that could cause a loss oof or damage to computer hardware, software, data, information, or processing capability. computer Security Risk
Somone who accesses a computer network illegally but has the intent of destroying data, stealing infor or other malicious actions. Cracker.
Has the same intent as a crtacker but does not have the technical skills and knowledge, often teens. Script Kiddie
Someone who uses email as a vehicle for extortion. Cyberextortionist
Someone who uses the Interent or network to destroy or damage computers for political reasons. Cyberterrorist
A program that copies itself repeatedly for example in memory or on a network using up resources abnd possibly shutting down the computer or network. Worm
A program that hides within or looks like a legit program. Trojan Horse
A seperate area of a hard disk that holds the infected file until the infection can be removed. Quarantine
A program or set of instructions in a program that alow users to bypass security controls when accessing a program, computer or network. Back door
A technique intruders use to make their network or Interent transmission appear legit to a vitim computer or network. Spoofing
A hardware and or software that protects a networks resources from intrusion by users on another network such as the Interent. Firewall
Occurs when the incoming electrical power increases significantly above the normal 120 volts Overvoltage, or power surge
Small text file that a web server stores on your computer Cookie
A scam in which the perpetrator sends an official looking email message that attempts to obtain your personal and financial info. Phishing
A scam, where a perpetrator attempts to obtain your personal and financial info, expet they do so via spoofing. Pharming
Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others. Social Engineering
An injury or disorder of the muscles, nerves, tendons, ligaments and joints. Repetitive Strain Injury
Reducing the electricity and environmental waste while using a computer. Green Computing
Created by: baileypaulson12
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards