Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Abstractions, Characteristics, and Influences

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
IP   Delivers packets (Using a routing function) to the destination using IP addresses and packet headers. Defines the addressing method used to encapsulate data.  
🗑
TCP   Provides reliable, ordered, and error-checked stream of packets.  
🗑
DNS   The service that translates URLs to IP addresses.  
🗑
IETF (Internet Engineering Task Force)   Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).  
🗑
Internet   A group of computers and servers that are connected to each other.  
🗑
Net Neutrality   A philosophy that all Internet traffic should be treated equally by Internet Service Providers.  
🗑
IP Address   A number assigned to any item that is connected to the Internet.  
🗑
Packets   Small chunks of information that have been carefully formed from larger chunks of information.  
🗑
Protocol   A set of rules governing the exchange or transmission of data between devices.  
🗑
Router   A type of computer that forwards data across a network  
🗑
Network Redundancy   Having multiple backups to ensure reliability during cases of high usage or failure. For routers in particular, it means there are multiple paths for the data to travel over, so if one line goes down, data progresses. Allows for fault-tolerance.  
🗑
HTTP   The protocol used for transmitting web pages over the Internet  
🗑
URL   An easy-to-remember address for calling a web page (like www.code.org)  
🗑
Hierarchical Nature   There are different levels of classification and adding new subcategories can add more possibilities which allows a system to scale.  
🗑
SSL/TLS   Helps communicate across a network in a way designed to prevent eavesdropping and tampering. Checks a digital certificate from a CA to help ensure the legitimacy of a site.  
🗑
Fault-Tolerant   There is a possibility for things to go wrong. This characteristic means that we are trying to counter that.  
🗑
Open Standards   By giving the protocols out, companies can build their devices to access the internet. This is a form of scaling, since more devices can easily connect so long as they follow protocol.  
🗑
End-to-End Architecture   This is a decentralized structure where much of the processes occur at the ends, rather than between nodes. This makes it difficult to stop the internet since there is not one localized headquarters.  
🗑
Distributed denial-of-service attacks (DDoS)   They compromise a target by flooding it with requests from multiple systems  
🗑
Phishing Scam   A thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.  
🗑
Virus   A program that runs on a computer to do something the owner of the computer does not intend.  
🗑
Anitvirus Software   Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.  
🗑
Firewall   Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.  
🗑
Asymmetric encryption   A type of cryptographic based on algorithms that require two keys -- one of which is secret (or private) and one of which is public (freely known to others).  
🗑
Public key   A value that can be used to encrypt a message. However, only when combined with a mathematically-related private key, can the message be decrypted.  
🗑
Private key   The complementary key to a public key that is used to decrypt a message.  
🗑
Encryption   a process of encoding messages to keep them secret, so only "authorized" parties can read it.  
🗑
Decryption   a process that reverses encryption, taking a secret message and reproducing the original plain text  
🗑
Symmetric Encryption   Both parties must have the key in order to encode and decode the message, which means they must communicate ahead of time to decide on a key.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Dhiller
Popular Computers sets