ICT

Subdecks (4)

Cards (129)

  • Data processing
    The process of converting raw data into an information
  • Firewall
    The primary purpose is network security
  • Star topology
    • Connects all devices in one center
  • System software
    • Linux
  • Network interface card
    The device that is not working when unable to connect to the school wifi network
  • Mesh topology
    • Robust, efficient, and easy to maintain
  • Wireless local area network/WLAN
    The type of networking with 5 end devices and one device in the middle
  • RAM
    The part of the hardware devices that does not have permanent storage device
  • Metropolitan Area Network
    The network connectivity and connection between many campuses
  • North bridge and south bridge
    The two hardware devices that identify the main chips of the computer
  • Detect
    The stage of cyber security that involves discovering breaches
  • Hybrid topology
    • A star topology and a ring topology, connected to a hub
  • Internet of things
    The acronym IOT
  • Respond Risk is not a stage of cybersecurity plan
  • Computer tower/system unit
    The image of a case (computer)
  • Malicious software
    The generic term of exploiting code and written by cybersecurity criminals
  • The employee does not have the necessary permission
    The reason why the employee cannot access the drive but others can
  • Tap
    In a bus topology, it allows a device to branch off to the main cable
  • Touch pad is not an internal component of a computer
  • Memory unit
    The part of the computer system that works to store instructions, data, and etc
  • Power Supply Unit
    The component responsible for providing power to other computer units
  • Router
    The picture of a switch with 4 antennas (router has many antennas)
  • Error free transmission over a physical medium
    The role of the data link layer in the OSI model
  • Application software

    Software like excel and calculations
  • Local area network
    The category of network with a PC, laptop, mouse, printer in a small area
  • Input
    The stage of data processing cycle that involves cleaning and organizing data for analysis
  • Justify
    The Microsoft feature that aligns text both horizontally and vertically
  • Metropolitan Area Network
    The type of network that is good for multiple cities in a city
  • Cyber Security
    The practice of defending service from malicious attack
  • Wide Area Network
    The network that connects the internet to government and other cities
  • MAN and LAN
    • The primary characteristics that distinguish them are coverage, area, and size
  • Data storage
    The stage of data processing that stores data
  • Cyber security regulation
    It serves as a framework design to protect from various cyber threats
  • Formula
    The Excel feature that John uses to organize the sales data
  • Network interface card
    The card with an antenna