click below
click below
Normal Size Small Size show me how
Year 7 Networking
Year 7 Networking unit
Term | Definition |
---|---|
Bits | Any pair of opposites, e.g. On/Off. |
BYTE | 8 Bits strung together. |
Bandwidth | The maximum transmission capacity of a device, measured by bit rate. |
Bitrate | The number of bits per second a system can transmit. |
Fiber optic cable | A network cable that contains strands of glass fibers and uses light to transmit data. |
Wireless network | A local-area network (LAN) that uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications. |
Wired network | A local-area network (LAN) that connects devices to the Internet or other network using cables. This network commonly uses cables connected to Ethernet ports on the network router on one end and to a computer or other device on the cable's opposite end. |
Mobile network | Also referred to as a cellular network, employs the use of radio frequencies that can be used simultaneously by several callers at one and the same time. |
Internet Protocol (IP) | A unique address written using a set of numbers organised in a particular way to identify each device on the network. |
Internet service provider (ISP) | A company that provides customers with Internet access. |
A Protocol | A well-known set of rules and standards used to communicate between machines. |
Domain Name System (DNS) | an Internet service that translates website names into IP addresses. The website names are alphabetic, as they're easier to remember. The Internet however, is really based on IP addresses. |
DNS spoofing | A type of cyberattack, when an attacker hacks into a server and changes the domain name to match with a wrong IP address and sends people to an imposter website. |
Router | A piece of computer hardware that acts as traffic managers to keep information packets moving efficiently over the Internet. |
The Internet | A global wide area network (WAN) that connects computer systems across the world. |
Web browser | The application you use to access and view the web pages from your device. |
Uniform Resource Locator (URL) | An address that identifies a particular webpage on the Internet. |
Hypertext Transfer Protocol (HTTP) | A protocol used on the WWW to communicate between web browsers and the server in order to transfer data. |
HTML (Hypertext Markup Language) | The code that controls the structure of content on webpages. |
COOKIES | ID cards sent from a website and stored on the user's device by the user's web browser so the next time you visit that site it will know who you are and load correct pages. |
SSL and TLS | A layer of security that provides secure channel for your online communications and protects you from hackers, by checking that a website has an authentic digital certificate. |
Encryption | It's a way of scrambling or changing a message to hide it and keep it secure from unwanted receivers. |
Decryption | It's a way of unscrambling the message to make it readable. |
Algorithm | A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer. |
Symmetric encryption | A form of encryption where a sender and a receiver share the same key used to encrypt and decrypt a message. The key has to be agreed on ahead in private. |
Asymmetric encryption | A form of encryption where different keys are used for encrypting and decrypting messages. It uses two keys, a public and a private key. |
Cybercrime | An act when someone is exploiting vulnerabilities in hardware and software to steel, compromise information or hack and hijack equipment. |
Computer virus | A program that gets installed usually unintentionally and harms the computer, it can often spread to other computers. |
Distributed Denial of Service (DDoS) | When a virus affects millions of computers worldwide and creates a BOT NET (digital bomb) to attack and take down websites. This is achieved by the hackers overwhelming a website with too many requests. |
Phishing scam | The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. |
Transmission Control Protocol (TCP) | A network protocol that manages the sending and receiving of all your data. Its role is to do an inventory to see if all packets have been received. |
Latency | Time it takes for a bit to travel from its sender to its receiver. |
ASCII | Code standard for information interchange that is the universally recognized as raw text format that any computer can understand. |
Network redundancy | Having multiple backups to ensure reliability during cases of high usage or failure |
Abstraction | Reducing information and detail to focus on essential characteristics. |
Server | A computer that awaits and responds to requests for data. |
Client | A computer that requests data stored on a server. |
Firewall | Software that runs on servers (often routers) that only allows traffic through according to some set of security rules. |