G12 CAT Networks & Internet

Cards (80)

  • The internet is a global network of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to link devices worldwide.
  • WAN is a network that covers a broad area, often a country or continent, connecting multiple LANs (Local Area Networks) together.
  • GAN refers to a network that covers a larger geographical area than a WAN, often encompassing the entire globe.
  • ISP is a company or organization that provides users and businesses with internet access.
  • Broadband refers to high-speed internet access that is faster and more efficient than traditional dial-up connections.
  • Bandwidth represents the maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps) or larger units like megabits per second (Mbps).
  • Line speed refers to the rate at which data is transmitted over an internet connection, usually measured in bits per second (bps) or Mbps.
  • Cap refers to a limit imposed by an ISP on the amount of data a user can upload or download within a specific time frame, typically on a monthly basis.
  • Shaped internet refers to a network management technique used by ISPs to control the speed or prioritize specific types of internet traffic.
  • Unshaped internet refers to an internet connection where there are no restrictions or prioritization applied to specific types of data traffic.
  • Mbps is a unit of data transfer speed, indicating millions of bits transmitted per second. It is commonly used to measure internet connection speeds.
  • ADSL is a type of broadband internet connection that uses existing telephone lines to transmit digital data.
  • Download refers to the process of transferring data, files, or content from a remote server or another computer to the user's device.
  • Upload refers to the process of transferring data or files from a user's device to a remote server or another computer.
  • A(n) modem is a device that converts digital data from a computer into analog signals for transmission over telephone lines or other communication channels. It also converts incoming analog signals back into digital data for the receiving computer.
  • A(n) router is a network device that directs data packets between different computer networks, determining the best path for data transmission. They also enable communication between the local network and the internet.
  • A(n) hotspot is a physical location where people can access the internet, typically using Wi-Fi, via a wireless local area network (WLAN). They are often found in public places like cafes, airports, and hotels.
  • A(n) access point is a hardware device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless communication standards.
  • Throttle refers to the intentional slowing down of internet speed or data transfer rate by an Internet Service Provider (ISP) after a certain usage limit has been reached, often to manage network congestion.
  • Instant Messaging is a real-time communication technology that allows users to send text messages, files, or multimedia content instantly over the internet.
  • VOIP is a technology that allows voice communication and multimedia sessions over the internet. It enables users to make phone calls and conduct video conferences using internet connections instead of traditional phone lines.
  • Video conferencing is a technology that enables individuals or groups in different locations to hold face-to-face meetings, discussions, or presentations over the internet using live video and audio feeds.
  • Cloud computing refers to the delivery of computing services, including storage, databases, servers, networking, software, analytics, and intelligence, over the internet.
  • Attachments are files, documents, images, or any other data added to an email or message.
  • FTP is a standard network protocol used to transfer files from one host to another over a network, such as the internet.
  • Online storage refers to a service that allows users to store and manage digital data, such as files, documents, photos, or videos, accessed via the internet.
  • Grid computing involves the coordinated use of multiple computers and resources across a network to solve complex problems, perform large-scale computations, or handle significant data processing tasks efficiently.
  • Distributed computing refers to a computing model where tasks are divided among multiple computers in a network, each contributing a portion of the computation.
  • The digital divide refers to the gap between individuals, communities, or countries that have access to modern information and communication technology (ICT) and those who do not.
  • Cybercrime refers to criminal activities conducted using computers and networks.
  • Malware is any software specifically designed to harm or exploit computer systems. Types include viruses, worms, Trojans, spyware, adware, and ransomware, among others.
  • Social engineering is a technique used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
  • Phishing is a type of social engineering attack where attackers use deceptive emails or websites to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
  • Spoofing involves disguising communication or identity to appear as someone else.
  • A(n) computer worm is a self-replicating malware program that spreads across computer networks without the need for user interaction, causing system slowdowns or network congestion.
  • A(n) computer virus is a malicious software program that attaches itself to other software or files. When these infected files are executed they damage or corrupt files, disrupt system functions, and steal sensitive data.
  • Spyware is software that secretly monitors and collects user information without their knowledge or consent.
  • A(n) keylogger is a type of spyware designed to record keystrokes on a computer or mobile device. They are used to capture sensitive information like passwords, credit card numbers, or personal messages.
  • A(n) Trojan is a type of malware disguised as legitimate software.
  • Pharming is a cyber attack where attackers redirect website traffic from a legitimate website to a fraudulent one without users' knowledge.