-
NIC
Network Interface Card
A hardware component on each device on a network that connects the device's circuitry to the communications line.
-
WAN
Wide Area Network
A network that connects computers located at different geographic locations.
-
ACL
Access Control List
A list that encodes the rules stating which packets are to be allowed through a firewall and which are to be prohibited.
-
ADSL
Asymmetric Digital Subscriber Lines
DSL lines that have different upload and download speeds.
-
ATM
Asynchronous Transfer Mode
A protocol that divides data into uniformly sized cells, eliminated the need for protocol conversion, and can process speeds from 1 to 156 Mbps. ATM can support both voice and data communication.
-
EVDO
A WAN wireless protocol standard.
-
HSDPA
A WAN wireless protocol standard.
-
HTTPS
An indication that a Web browser is using the SSL/TLS protocol to ensure secure communications.
-
ISP
Internet Service Provider
-
MAC address
Media Access Control address
A unique, permanent address address given to each network interface card (NIC) at the factory. Enables the device to access the network via a Level-2 protocol.
-
POP
Point of Presence
The location at which a line connects to a PSDN (public switched data network) network. Think of the POP as the phone number you dial to connect to the PSDN.
-
PSDN
Public Swtiched Data Network
A WAN connection alternative. A network of computers and leased lines is developed and maintained by a vendor that leases time on the network to other organizations.
-
SSL
Secure Socket Layer
A protocol that uses both asymmetric and symmetric encryption. The most recent version of SSI is called TLS.
-
SDSL
Symmetrical digital subscriber lines
DSL lines that have the same upload and download speeds.
-
TLS
Transport Layer Security
A protocol, using both asymmetric and symmetric encryption that works between Levels 4 (transport) and 5 (application) of the TCP-OSI protocol architecture. TLS is the new name for a later version of SSL.
-
UTP Cable
Unshielded Twisted Pair Cable
A type of cable used to connect devices on a lan. A device called an RJ-45 connector is used to connect the UTP cable into NIC devices.
-
VPN
Virtual Private Network
A WAN connection alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections.
-
WNIC
Wireless Network Interface Card
Enables wireless networks by communicating with wireless access points. WNICs operate according to the 802.11 protocol.
-
AP
Access Point
A point in a wireless network that facillitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks.
-
Wireless devices connect to a wireless LAN using a(n):
Access Point
-
What is an access device that connects each site to the transmission lines?
Switch
-
What is the dominant WLAN standard today?
IEEE 802.11g
-
What is a special version of asymmetric encryption that is popular on the Internet?
public key/private key
-
Communications speeds are measured in:
bits.
-
What do HTTPS and SSL/TLS utilize?
A combination of public key/private key and symmetric encryption.
-
What is the world's most popular protocol for LANs?
IEEE 802.3
-
What are computers and printers on a LAN connected to in order to communicate and transmit messages on the LAN?
A switch
-
What is SQL?
A query language. It stands for Structured Query Language. It is an international standard language for processing database data.
-
A collection of similar records is a:
file.
-
When can data integrity problems occur?
When data are duplicated.
-
An entity has a unique attribute which is known as the:
identifier.
-
DBMS
Database Management Systems
A program for creating, processing, and administering a database. Ex: Access, Oracle
-
How do designers represent relationships when transforming a data model into a database design?
By using foreign keys.
-
UML
Unifed Modeling Language
A series of diagramming techniques that facilitates OOP development.
-
Constraints on the number of entities are called:
minimum cardinalities.
-
What is the term for the maximum number of entities that can be involved in a relationship?
Maximum Cardinality.
-
Data in the CPU is processed in the form of:
bits.
-
DB2
A popular, enterprise-class DBMS product from IBM.
-
MySQL
A popular open source DBMS product that is license-free for most applications.
-
SQL Server
A popular enterprise-class DBMS product from Microsoft.
-
OS
Operating System
A computer program that controls the computer's resources.
-
What are the 4 major operating systems?
- 1. Windows
- 2. Mac OS
- 3. Unix
- 4. Linus
-
What is the means by which the CPU reads instructions and data from main memory and writes data to main memory?
Bus
-
CPU
Central Processing Unit
The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.
-
What is a cloud?
The computing network on the Internet
-
What is firmware?
Computer software that is installed into devices such as printers, print services, and various types of communication devices.
-
GNU
A set of tools for creating and managing open source software.
-
What is one of the standard license agreements for open source software?
GNU General Public License (GPL) Agreement
-
What is the term for data that will be lost when the computer or device is not powered?
Volatile memory
-
Kilobyte (K): 1,024 bytes
Megabyte (MB): 1,024 K
Gigabyte (GB): 1.024 MB
Terabyte (TB) 1,024 GB
- Mnemonic:
- Kill My Geography Teacher
-
What is an application that requires support beyond a browser on the user's computer known as?
Thick Client
-
What is the most common type of memory device?
Magnetic disk.
-
Who developed Linux?
An open source community.
-
Give an example of operational costs for:
Hardware
Software
Data
Procedures
People
- Hardware: Hardware Maintenance Fees
- Software: Software Maint. and support fees &costs
- Data: Data acquisition costs
- Procedures: Procedure maintenance costs
- People: Labor Costs of using system.
-
Give an example of development costs for:
Hardware
Software
Data
Procedures
People
- Hardware: Hardware purchases
- Software: Software licenses
- Data: Data conversion costs
- Procedures: Design, development, and documentation
- People: Initial training costs
|
|