click below
click below
Normal Size Small Size show me how
CIS FINAL
| Question | Answer |
|---|---|
| Describes a process in which two or more computers or devices transfer data, instructions, and information. | Communications |
| People connect wirelessly to the internet through a ___________________ using mobile computers or other devices. | Wireless Internet Access Point |
| work on line is also known as | collaborating |
| A navigation system that cdonsists of one or more earth-based recievers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location. | Global Positioning System (GPS) |
| Software that helps groups of people work together on projects and share information over a network. | Groupware |
| A collection of computers and devices connected together via communications devices and transmission media. | Network |
| A network that connects computers and devices in a limited geographical area such as a home school computer lab, office buildings or closely positioned group of buildings. | Local Area Network (LAN) |
| A LAN that uses no physical wires. | Wireless Lan (WLAN) |
| A high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across the region. | Metropolitan Area Network (MAN) |
| A network that covers a large geographic area using a communications channel that combines many types of media such as telephone lines, cables and radio waves. | Wide Area Network (WAN) |
| One or more computers act as a server and the other computers on the network request services from the server. | Client/Server network |
| Sometimes called a host computer, controls access to the hardware, software and other resources on the network and provides a centralized stroage area for programs, data and info. | Server |
| Other computers and mobile devices on the network that rely on the server for its resources. | Clients |
| A simple, inexpensive network that typically connects fewer that 10 computers. | Peer to Peer |
| Refers to the layout of the computers and devices in a communications network. | Network topology |
| A network that consists of a single central cable, to which all computers and other devices connect. | Bus Network |
| A network where a cable forms a closed loop with all computers and devices arranged along the ring. | Ring Network |
| Specifies computers and devices on the network share or pass a special signal, called a token, in a unidirectional manner and in a preset order. | Token Ring |
| A network standard, specifically a protocol, that defines how messages are routed from one end of a network to the other, ensuring the data arrives correctly. | TCP/IP |
| A standard specifically a protocol, that defines how a network usues radio signals to communicate with a tag placed in or attached to an object, animal or person. | RFID (Radio frequency identification) |
| Any of several types of long distance digital telephone lines that carry multiple signals over a single communications line. | T-Carrier line |
| The amount of data, instructions, and info that can travel over a communications channel | Bandwidth |
| An electrical disturbance that can degrade communications | Noise |
| The process of comparing data with a set of rules or values to find out if the data is correct. | Validation |
| A window on the screen that provides areas sfor entering or changing data in a database. | Form |
| Any event or action that could cause a loss oof or damage to computer hardware, software, data, information, or processing capability. | computer Security Risk |
| Somone who accesses a computer network illegally but has the intent of destroying data, stealing infor or other malicious actions. | Cracker. |
| Has the same intent as a crtacker but does not have the technical skills and knowledge, often teens. | Script Kiddie |
| Someone who uses email as a vehicle for extortion. | Cyberextortionist |
| Someone who uses the Interent or network to destroy or damage computers for political reasons. | Cyberterrorist |
| A program that copies itself repeatedly for example in memory or on a network using up resources abnd possibly shutting down the computer or network. | Worm |
| A program that hides within or looks like a legit program. | Trojan Horse |
| A seperate area of a hard disk that holds the infected file until the infection can be removed. | Quarantine |
| A program or set of instructions in a program that alow users to bypass security controls when accessing a program, computer or network. | Back door |
| A technique intruders use to make their network or Interent transmission appear legit to a vitim computer or network. | Spoofing |
| A hardware and or software that protects a networks resources from intrusion by users on another network such as the Interent. | Firewall |
| Occurs when the incoming electrical power increases significantly above the normal 120 volts | Overvoltage, or power surge |
| Small text file that a web server stores on your computer | Cookie |
| A scam in which the perpetrator sends an official looking email message that attempts to obtain your personal and financial info. | Phishing |
| A scam, where a perpetrator attempts to obtain your personal and financial info, expet they do so via spoofing. | Pharming |
| Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others. | Social Engineering |
| An injury or disorder of the muscles, nerves, tendons, ligaments and joints. | Repetitive Strain Injury |
| Reducing the electricity and environmental waste while using a computer. | Green Computing |