Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Cyberspace Quiz 2

QuestionAnswer
What are telecommuniations? The electronic transmission and reception of signals for voice and data communications
Does a wireless network do? they transport data from one device to another without cables or wires
What are 2 downsides of wireless networks 1. slower than wired networks 2. security concerns
What is WiFi? wireless networking technologies that are compatible with Ethernet
What standards is wifi based on? Based on the IEEE 802.11 standards
What does IEEE stand for? Institute of Electrical and Electronics Engineers
What is needed for WiFi to connect? Network Interface Card (NIC)
WiFi uses radio frequencies to transmit by using ___ GHz and ____ Ghz 2.4; 5.8
What is a WiFi hotspot wireless access point
What is true about WiFi security? Wireless networks are much more susceptible to unauthorized access and use than wired networks
What is LAN jacking (or war driving) The practice of intercepting wireless signals by cruising through an area.
What does wireless encyption do? Scrambles data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key
what does WEP stand for Wired Equivalent Privacy
What does WPA stand for Wi-Fi Protected Access
What is bluetooth? Short-range, wireless network technology
What does bluetooth do make its own connections (piconet) between electronic devies, without wires, cables, or any direct action from a user
What is the range of bluetooth 30 ft, can be extended to 100ft
What can happen to an open bluetooth connection on a computer? It can be used by a hacker to access files on the computer
What is RFID Radio Frequency Identification
What does RFID use? tags and transponders that are very small and contain an antenna and memory chip
What are two types of tags for RFID Active, which uses self-contained battery power and Passive, which uses no battery and must be activated by using electromagnetic waves
What is an example of an Active tag? EZ Pass
What is IrDa Infrared Dat Association
What does IrDA do? it uses infrared light waves, must have an IrDA port and has line of sight technology (ex, tv remote control)
What does WiMax stand for Worldwide Interoperability for Microwave Access aka IEEE 802.16
What is WiMax A 4th generation wireless broadband technology that evolved from Wi-Fi to provide faster Internet access at a longer range
What is portable wiMAX portable technology used for Internet access available to subscribers anywhere within a twoer's coverage area
What does GPS stand for global positioning system
How does GPS work? it uses satellites to pinpoint the location of ojects on earth
What is geotagging the process of adding geopgraphic identification metadata to digital media and messages
What is Email technology Web based e-mail accounts that allow you to use a browser to access your e-mail messages
What does POP stand for Post Office Protocol
What is POP server a computer that stores your incoming messages until they can be transferred to your hard disk
What does SMTP stand for Simple Mail Transfer Protocol
What is an SMTP server? A server that allows storage of outgoing messages until the user is ready to send them
What does IMAP stand for Internet Access Message Protocol
What is IMAP used for outgoing mail; users can also download incoming email or leave it on the server (ex, blackberry)
What is email encryption used when personal computer users want to encrypt email or other documents, they turn to public key encrpytion software called PGP
What does PGP software stand for Pretty Good Privacy software
What do most cellular service proviers offer data service plans for accessing the Internet
What are the fastest cellular technologies for Internet access? EDGE, EV-DO
Cellular Data Services are the _____ growing segment of electronic communication Fastest
What is a cellular carrier? a company that builds and maintains a cellular network and provides cell phone service to the public
What does GSM stand for Global System for Mobile Communications
What is the Global system for Mobile Communications the most popular international standard for mobile phones
What is the CDMA Code Division Multiple Access
What is the Code Division Multiple Access the networking standard that is predonminantly used in the United States
How many cell phone generations are there? 4
Computer networks ____ communication between a source and destination facilitate
What is a node? any device connected to the network transmission medium = physical connection
What is a transmission medium? physical connection (wire, fiber optic, air (wireless))
What is NIC Network Interface Card -- needed to connect
What is transmission protocol? rules that govern network access
what are packets all messages broken up into packets
Network devices can function as _____ or ____ clients; servers
What types of servers can network devices function as? application, file, print
True/False: Networks that include one or more servers can operate in client/server mode true
What is TCP/IP Rules for efficiently transmitting data from one network node to another
What does TCP stand for Transmission Control Protocol
what does IP stand for Internet protocol
What do packets do? Packets are parcels of data that is sent across a computer network
What is LAN a privately owned computer network that connects computers and devices within the same building or local geographic area
what is intranet a web server that provides confidential data to Lan users
What are advantages of lan? increased productivity, reduced cost
What are disadvantages of lan? resources can become unavailable when network malfunctions, network access may be vulnerable to unauthorized access, networks can be tapped from a "snooping" computer, more susceptible to increasing # of worms, trojans horses and blended threats
What is a Lan party? gathering of people who connect their own computers to a LAN, usually to play games
What are physical topologies? the arrangement of devices in a network
What is star? a hub in the middle, inexpensive, however if hub fails then the network crashes
What is ring? all info on the ring goes around the ring other computers, good for offices, however no privacy and if one node fails the network crashes
What is bus? inexpensive, used in smaller places, if one computer fails the rest do not fail, but if the whole bus fails then the network fails
What is token ring? token allows only one person with token to release things into the network. Can with with ring and star too. The network can't be clogged, but you have to wait your turn to have the token
What is ethernet? simultaneously broadcasts data packets to all network devices
What is a bridge? when two similar networks can be connected by a device
______ is a generic term for any device or software code used to join two networks gateway
What does encrpytion do? transforms a message so that the contents are hidden from unauthorized readers
When something is in plaintext, has it been encrypted yet? no
an encrypted message is referred to as ciphertext
______ is the opposite of encrpytion decryption
What is public key encryption? It eliminates key-distribution problems by using 1 key to encrpyt, and another decrypt
Created by: nicolefassak
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards