This is the practice of protecting computers, networks, programs, and data from unauthorized access, attacks, or damage.
Cybersecurity
This is the brain of the computer this called...?
CPU (central processing unit)
Any device connected to the network: computers, phones, printers, game consoles are called what?
Nodes/Host devices
What are internet protocols? Why is it needed?
What is a layout of interconnected network components and allows you to visualize the flow of data? (MAP!)
Network Topology
Text messages that are scams are called what? (Via text messages)
Smishing
RAM (random access memory) allows you to run your apps, files and games right now! What happens when the end device is shut down?
A unique number for every device, like a “digital home address.” 🏠 What is this called?
IP address
What was ARPANET? And what was the use?
Developed by the military and was use for packet switching
Or
Used for the military to send message via TCP/IP protocols
Core layer
Distribution layer
Access layer
What is the basic language of computers?
Binary
Name two long term storage devices. Which 2 of the two devices run faster?
Hard drives and SSD.
SSD is faster think of your phone.
End devices that initiate requests (browsers, apps) and this device(s) provide responses like a web server or email server. What type of relationship is this?
Client-server Model
FILL in the blanks of this timeline.
1969: ARPANET
1983: TCP/IP
1980s: Ethernet
1990:
2000s:
2010s: 5G
2020s: cloud, IoT (internet of things)
Today: AI
The web and WIFI
East-west traffic
Change this number 10 to binary? Don't to forget to flip the bits!
1010
Name 3 of the 5 operating systems we mentioned in our discussions.
Windows, MacOS, Linux, iOS, Android
When you file share directly with some is called what?
Peer to peer
P2P
This has its set of protocols for establishing WIRED connections. Became the most used → reliable, fast, cheap. Devices like, computers, printers and servers. What is this called?
Ethernet
Data flow east-west allows for what type of security threat? Please name it
Internal security breach
Change this number 20 to binary? Don't to forget to flip the bits!
10100
Tools you use to put information INTO the computer. They let YOU talk to the computer are called what?
Input/Outputs
Devices connected to central switch/hub (common today) and will extend in many network directions devices. What type of network topology is called?
Star Topology
Please describe what a HTTP is? Please write one on the board.
Which connection is the fastest?
DSL, ADSL, Cable, or dial UP?
Cable