Download Test 3 review guide 50 questions 10 T/F and 40 multiple choices

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

AppleTalk wikipedia , lookup

Net neutrality law wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Net bias wikipedia , lookup

Airborne Networking wikipedia , lookup

Packet switching wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Test 3 review guide
50 questions
10 T/F and 40 multiple choices
One hour
*** To prepare for the test you must refer to the lecture notes and lecture book posted on the course website and
don’t forget the lecture complement posted on the course website (Check the announcement page)
1- Networking and definition of a network
2- Network physical topology and different network structures
3- Peer to peer and other networks
4- Network protocol
5- Handshaking
6- Physical storage model
7- Cluster and sector
8- Network physical and logical topology
9- Bluetooth apps
10- Packet switching
11- TCP/IP
12- Database field, record and table or relation
13- Database front end and back end applications.
14- Keys: Primary and secondary
15- Cellular technology GSM and CDMA
16- SIM card
17- XHTML: Head and body
18- HTML Pair of tags
19- FTP: File transfer protocol
20- OODB most important properties
21- Functions of the protocol or logical topology
22- Handshaking
23- WI-FI and WI-MAX= WI-MAX range
24- Important limitation of WI-Max (speed/distance)
25- Windows explorer and MAC finder
26- FDX, HDX and simplex communication
27- Synchronous and asynchronous communication
28- WI-MAX influence on the Internet access
29- Bluetooth network
30- Bluetooth protocols
31- Bluetooth security apps
32- ISPs Tier 1, Tier 2 and Tier 3
33- Packets and packet switching
34- Important Characteristics of Internet access.
35- Always – ON Internet access
36- Intranet
37- Extranet
38- VPN (Virtual Private Network)
39- Tunneling protocol
40- VAN and EDI
41- W3C, IETF and other agencies
42- Email technology
43- Email protocols and important features
44- Email attachment – MIME
45- Mailing list
46- Webmail (Hotmail, Yahoo and Gmail)
47- HTTP
48- Browser
49- Search engine
50- Helper applications: Plug-ins, players
51- Chat and text messaging
52- Domain name server
53- URL and IP address.
54- Sorting and selection queries
55- Data-warehouse
56- Data-mart
57- Storing names in a database
58- Relationship in database
59- Types of e-commerce
60- disintermediation
61- Store front
62- shopping cart
63- cookies
64- M-commerce
65- E-tailing
66- Digital certificate
67- Authentication technologies
68- Biometrics
69- Virus
70- Worm
71- Denial of service attack
72- Trojan horse
73- Back-door Trojan-Horse is designed to open computer ports and allow hackers to get in.
74- Hoax and spam
75- Time bomb
76- Logic bomb
77- Zombies
78- Botnets
79- Trigger event and payload of a virus
80- Web server software deals with requests for web pages.
81- Functions of DBMS
82- File manager
83- Move/delete files (Clusters status)
84- Recycle bin.
85- Conversion decimal/binary, binary/decimal and HEX/binary and decimal.