Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Year 7 Networking

Year 7 Networking unit

TermDefinition
Bits Any pair of opposites, e.g. On/Off.
BYTE 8 Bits strung together.
Bandwidth The maximum transmission capacity of a device, measured by bit rate.
Bitrate The number of bits per second a system can transmit.
Fiber optic cable A network cable that contains strands of glass fibers and uses light to transmit data.
Wireless network A local-area network (LAN) that uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications.
Wired network A local-area network (LAN) that connects devices to the Internet or other network using cables. This network commonly uses cables connected to Ethernet ports on the network router on one end and to a computer or other device on the cable's opposite end.
Mobile network Also referred to as a cellular network, employs the use of radio frequencies that can be used simultaneously by several callers at one and the same time.
Internet Protocol (IP) A unique address written using a set of numbers organised in a particular way to identify each device on the network.
Internet service provider (ISP) A company that provides customers with Internet access.
A Protocol A well-known set of rules and standards used to communicate between machines.
Domain Name System (DNS) an Internet service that translates website names into IP addresses. The website names are alphabetic, as they're easier to remember. The Internet however, is really based on IP addresses.
DNS spoofing A type of cyberattack, when an attacker hacks into a server and changes the domain name to match with a wrong IP address and sends people to an imposter website.
Router A piece of computer hardware that acts as traffic managers to keep information packets moving efficiently over the Internet.
The Internet A global wide area network (WAN) that connects computer systems across the world.
Web browser The application you use to access and view the web pages from your device.
Uniform Resource Locator (URL) An address that identifies a particular webpage on the Internet.
Hypertext Transfer Protocol (HTTP) A protocol used on the WWW to communicate between web browsers and the server in order to transfer data.
HTML (Hypertext Markup Language) The code that controls the structure of content on webpages.
COOKIES ID cards sent from a website and stored on the user's device by the user's web browser so the next time you visit that site it will know who you are and load correct pages.
SSL and TLS A layer of security that provides secure channel for your online communications and protects you from hackers, by checking that a website has an authentic digital certificate.
Encryption It's a way of scrambling or changing a message to hide it and keep it secure from unwanted receivers.
Decryption It's a way of unscrambling the message to make it readable.
Algorithm A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Symmetric encryption A form of encryption where a sender and a receiver share the same key used to encrypt and decrypt a message. The key has to be agreed on ahead in private.
Asymmetric encryption A form of encryption where different keys are used for encrypting and decrypting messages. It uses two keys, a public and a private key.
Cybercrime An act when someone is exploiting vulnerabilities in hardware and software to steel, compromise information or hack and hijack equipment.
Computer virus A program that gets installed usually unintentionally and harms the computer, it can often spread to other computers.
Distributed Denial of Service (DDoS) When a virus affects millions of computers worldwide and creates a BOT NET (digital bomb) to attack and take down websites. This is achieved by the hackers overwhelming a website with too many requests.
Phishing scam The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Transmission Control Protocol (TCP) A network protocol that manages the sending and receiving of all your data. Its role is to do an inventory to see if all packets have been received.
Latency Time it takes for a bit to travel from its sender to its receiver.
ASCII Code standard for information interchange that is the universally recognized as raw text format that any computer can understand.
Network redundancy Having multiple backups to ensure reliability during cases of high usage or failure
Abstraction Reducing information and detail to focus on essential characteristics.
Server A computer that awaits and responds to requests for data.
Client A computer that requests data stored on a server.
Firewall Software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Created by: mgl
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards