Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Year 7 Networking unit

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Bits   Any pair of opposites, e.g. On/Off.  
🗑
BYTE   8 Bits strung together.  
🗑
Bandwidth   The maximum transmission capacity of a device, measured by bit rate.  
🗑
Bitrate   The number of bits per second a system can transmit.  
🗑
Fiber optic cable   A network cable that contains strands of glass fibers and uses light to transmit data.  
🗑
Wireless network   A local-area network (LAN) that uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications.  
🗑
Wired network   A local-area network (LAN) that connects devices to the Internet or other network using cables. This network commonly uses cables connected to Ethernet ports on the network router on one end and to a computer or other device on the cable's opposite end.  
🗑
Mobile network   Also referred to as a cellular network, employs the use of radio frequencies that can be used simultaneously by several callers at one and the same time.  
🗑
Internet Protocol (IP)   A unique address written using a set of numbers organised in a particular way to identify each device on the network.  
🗑
Internet service provider (ISP)   A company that provides customers with Internet access.  
🗑
A Protocol   A well-known set of rules and standards used to communicate between machines.  
🗑
Domain Name System (DNS)   an Internet service that translates website names into IP addresses. The website names are alphabetic, as they're easier to remember. The Internet however, is really based on IP addresses.  
🗑
DNS spoofing   A type of cyberattack, when an attacker hacks into a server and changes the domain name to match with a wrong IP address and sends people to an imposter website.  
🗑
Router   A piece of computer hardware that acts as traffic managers to keep information packets moving efficiently over the Internet.  
🗑
The Internet   A global wide area network (WAN) that connects computer systems across the world.  
🗑
Web browser   The application you use to access and view the web pages from your device.  
🗑
Uniform Resource Locator (URL)   An address that identifies a particular webpage on the Internet.  
🗑
Hypertext Transfer Protocol (HTTP)   A protocol used on the WWW to communicate between web browsers and the server in order to transfer data.  
🗑
HTML (Hypertext Markup Language)   The code that controls the structure of content on webpages.  
🗑
COOKIES   ID cards sent from a website and stored on the user's device by the user's web browser so the next time you visit that site it will know who you are and load correct pages.  
🗑
SSL and TLS   A layer of security that provides secure channel for your online communications and protects you from hackers, by checking that a website has an authentic digital certificate.  
🗑
Encryption   It's a way of scrambling or changing a message to hide it and keep it secure from unwanted receivers.  
🗑
Decryption   It's a way of unscrambling the message to make it readable.  
🗑
Algorithm   A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.  
🗑
Symmetric encryption   A form of encryption where a sender and a receiver share the same key used to encrypt and decrypt a message. The key has to be agreed on ahead in private.  
🗑
Asymmetric encryption   A form of encryption where different keys are used for encrypting and decrypting messages. It uses two keys, a public and a private key.  
🗑
Cybercrime   An act when someone is exploiting vulnerabilities in hardware and software to steel, compromise information or hack and hijack equipment.  
🗑
Computer virus   A program that gets installed usually unintentionally and harms the computer, it can often spread to other computers.  
🗑
Distributed Denial of Service (DDoS)   When a virus affects millions of computers worldwide and creates a BOT NET (digital bomb) to attack and take down websites. This is achieved by the hackers overwhelming a website with too many requests.  
🗑
Phishing scam   The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.  
🗑
Transmission Control Protocol (TCP)   A network protocol that manages the sending and receiving of all your data. Its role is to do an inventory to see if all packets have been received.  
🗑
Latency   Time it takes for a bit to travel from its sender to its receiver.  
🗑
ASCII   Code standard for information interchange that is the universally recognized as raw text format that any computer can understand.  
🗑
Network redundancy   Having multiple backups to ensure reliability during cases of high usage or failure  
🗑
Abstraction   Reducing information and detail to focus on essential characteristics.  
🗑
Server   A computer that awaits and responds to requests for data.  
🗑
Client   A computer that requests data stored on a server.  
🗑
Firewall   Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: mgl
Popular Computers sets