Red pill or Blue pill
Build your Computer
Networking
History of the internet
Network pt.2
100

This is the practice of protecting computers, networks, programs, and data from unauthorized access, attacks, or damage.

Cybersecurity

100

This is the brain of the computer this called...?

CPU (central processing unit)

100

Any device connected to the network: computers, phones, printers, game consoles are called what?

Nodes/Host devices

100

What are internet protocols? Why is it needed?

Set of rules. This allows computers/devices to communicate with each other.
100

What is a layout of interconnected network components and allows you to visualize the flow of data? (MAP!)

Network Topology

200

Text messages that are scams are called what? (Via text messages)

Smishing

200

RAM (random access memory) allows you to run your apps, files and games right now! What happens when the end device is shut down?

Ram forgets everything
200

A unique number for every device, like a “digital home address.” 🏠 What is this called?

IP address

200

What was ARPANET? And what was the use?

Developed by the military and was use for packet switching 

Or

Used for the military to send message via TCP/IP protocols

200
Please name the three tier model layers? In order from top to bottom.

Core layer

Distribution layer

Access layer

300

What is the basic language of computers?

Binary

300

Name two long term storage devices. Which 2 of the two devices run faster?

Hard drives and SSD.

SSD is faster think of your phone.

300

End devices that initiate requests (browsers, apps) and this device(s) provide responses like a web server or email server. What type of relationship is this?

Client-server Model

300

FILL in the blanks of this timeline.

1969: ARPANET
1983: TCP/IP
1980s: Ethernet
1990:
2000s:
2010s: 5G

2020s: cloud, IoT (internet of things)

Today: AI

The web and WIFI

300
This is where the data flows left to right and back and forth with many machines and devices. What is this type of data flow called?

East-west traffic

400

Change this number 10 to binary? Don't to forget to flip the bits!

1010

400

Name 3 of the 5 operating systems we mentioned in our discussions.

Windows, MacOS, Linux, iOS, Android

400

When you file share directly with some is called what?

Peer to peer 

P2P

400

This has its set of protocols for establishing WIRED connections. Became the most used → reliable, fast, cheap. Devices like, computers, printers and servers. What is this called?

Ethernet

400

Data flow east-west allows for what type of security threat? Please name it

Internal security breach

500

Change this number 20 to binary? Don't to forget to flip the bits!

10100

500

Tools you use to put information INTO the computer. They let YOU talk to the computer are called what?

Input/Outputs

500

Devices connected to central switch/hub (common today) and will extend in many network directions devices. What type of network topology is called?

Star Topology

500

Please describe what a HTTP is? Please write one on the board.

500

Which connection is the fastest? 

DSL, ADSL, Cable, or dial UP?

Cable

M
e
n
u