Save
ICT
Save
Share
Learn
Content
Leaderboard
Learn
Created by
AlertSardines62197
Visit profile
Subdecks (4)
CYBERSECURITY
ICT
14 cards
COMPUTER NETWORKS
ICT
22 cards
HARDWARE AND SYSTEM
ICT
31 cards
DATA PROCESSING
ICT
27 cards
Cards (129)
Data processing
The process of converting raw data into an information
Firewall
The primary purpose is network security
Star topology
Connects all devices in one center
System software
Linux
Network interface card
The device that is not working when unable to connect to the school wifi network
Mesh topology
Robust, efficient, and easy to maintain
Wireless local area network/WLAN
The type of networking with 5 end devices and one device in the middle
RAM
The part of the hardware devices that does not have permanent storage device
Metropolitan Area Network
The network connectivity and connection between many campuses
North bridge and south bridge
The two hardware devices that identify the main chips of the computer
Detect
The stage of cyber security that involves discovering breaches
Hybrid topology
A star topology and a ring topology, connected to a hub
Internet of things
The acronym IOT
Respond Risk
is not a stage of cybersecurity plan
Computer tower/system unit
The image of a case (computer)
Malicious software
The generic term of exploiting code and written by cybersecurity criminals
The employee does not have the necessary permission
The reason why the employee cannot access the drive but others can
Tap
In a bus topology, it allows a device to branch off to the main cable
Touch pad
is not an internal component of a computer
Memory unit
The part of the computer system that works to store instructions, data, and etc
Power Supply Unit
The component responsible for providing power to other computer units
Router
The picture of a switch with 4 antennas (router has many antennas)
Error free transmission over a physical medium
The role of the data link layer in the OSI model
Application software
Software like excel and calculations
Local area network
The category of network with a PC, laptop, mouse, printer in a small area
Input
The stage of data processing cycle that involves cleaning and organizing data for analysis
Justify
The Microsoft feature that aligns text both horizontally and vertically
Metropolitan Area Network
The type of network that is good for multiple cities in a city
Cyber Security
The practice of defending service from malicious attack
Wide Area Network
The network that connects the internet to government and other cities
MAN and LAN
The primary characteristics that distinguish them are coverage, area, and size
Data storage
The stage of data processing that stores data
Cyber security regulation
It serves as a framework design to protect from various cyber threats
Formula
The Excel feature that John uses to organize the sales data
Network interface card
The card with an antenna
See all 129 cards