Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
b wireless |
2.4 freq long dist slow speed |
|
a wireless |
5.0 freq short dist fast speed |
|
g wireless
|
2.4 freq
long dist fast speed compatible with b |
|
n wireless
|
2.4 and 5.0 freq
very long dist very fast speed |
|
bluetooth
|
not secure
short dist only connect to 1 20-30 feet high battery life |
|
kat 5 cable
|
copper, 8 small copper wires
|
|
coax cable |
big chunk of copper with foil sheild
|
|
fiberoptic cable |
pulses of light on a glass filament
|
|
wireless. |
electromagnetic waves
|
|
interference in transmisison |
copper is twisted to prevent it
little to no interference on fiber lots of interference in wireless (microwave) |
|
pop3 |
traditional
need a local client emails saved on your hard drive no remote access |
|
IMAP |
can access your emails anywhere
internet browser access |
|
SMTP |
transfers your mail from the mail server to your computer and vice versa. |
|
encryption |
gives the user's file confidentiality
|
|
types of encryption |
substitution
transposition AES |
|
negatives to encryption |
takes time
not convenient more power used |
|
user account control |
need admin to enter password when a non admin user is on the computer. can help to protect against malware. gives you more security.
|
|
compression |
converts repeating characters into a single variable. makes the file size smaller so it is easier to send. |
|
we dont compress everything because |
it would take a lot of time to decompress everything.
|
|
what is a driver |
a program that allows the PC to communicate with the device or piece of hardware
|
|
plug and play |
anything that is plugged into the computer via USB will install a driver immediately so you are able to use the device instantly
|
|
Manufacturer vs Windows drivers |
Manufacturer drive will give you full access to the device
Windows driver |
|
Virus |
cannot self-replicate to other systems without human intervention
|
|
worm |
network
self-replicating |
|
trojan |
installed in the background of legit installation
|
|
macro |
within Microsoft Office (.doc, .docx., word, excel, .pdf)
|
|
root kit |
establishes itself before the operating system is loaded
|
|
keylogger |
captures every single key that you type on the keyboard.
|
|
windows updates |
updates all windows programs. (java, web browsers, flash, drivers)
|
|
Windows firewall |
keeps bad things from entering your computer by monitoring ports.
|
|
dns |
domain name system. translates domain name into IP address and vice versa
|
|
dhcp
|
automatically sets all IP config elements |
|
5 elements of ip config
|
ip address
subnet mask default gateway DNS 1 DNS 2 |
|
ip address |
tells which computer it is (unique) |
|
subnet mask |
tells which network you are on |
|
default gateway |
destination for all traffic that is not local usually the router |
|
DNS 1 and DNS 2 |
allows you to go to URLs you dont already know |
|
drive by download |
a malicious program that is automatically downloaded to your computer without your consent. can be downloaded by visiting a website or clicking on a malicious URL. |
|
spear phishing |
tricks the user to click on a malicious URL by presenting something to the user that they would be interested in clicking on. |