* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Test 3 review guide 50 questions 10 T/F and 40 multiple choices
Wireless security wikipedia , lookup
Net neutrality law wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Airborne Networking wikipedia , lookup
Test 3 review guide 50 questions 10 T/F and 40 multiple choices One hour *** To prepare for the test you must refer to the lecture notes and lecture book posted on the course website and don’t forget the lecture complement posted on the course website (Check the announcement page) 1- Networking and definition of a network 2- Network physical topology and different network structures 3- Peer to peer and other networks 4- Network protocol 5- Handshaking 6- Physical storage model 7- Cluster and sector 8- Network physical and logical topology 9- Bluetooth apps 10- Packet switching 11- TCP/IP 12- Database field, record and table or relation 13- Database front end and back end applications. 14- Keys: Primary and secondary 15- Cellular technology GSM and CDMA 16- SIM card 17- XHTML: Head and body 18- HTML Pair of tags 19- FTP: File transfer protocol 20- OODB most important properties 21- Functions of the protocol or logical topology 22- Handshaking 23- WI-FI and WI-MAX= WI-MAX range 24- Important limitation of WI-Max (speed/distance) 25- Windows explorer and MAC finder 26- FDX, HDX and simplex communication 27- Synchronous and asynchronous communication 28- WI-MAX influence on the Internet access 29- Bluetooth network 30- Bluetooth protocols 31- Bluetooth security apps 32- ISPs Tier 1, Tier 2 and Tier 3 33- Packets and packet switching 34- Important Characteristics of Internet access. 35- Always – ON Internet access 36- Intranet 37- Extranet 38- VPN (Virtual Private Network) 39- Tunneling protocol 40- VAN and EDI 41- W3C, IETF and other agencies 42- Email technology 43- Email protocols and important features 44- Email attachment – MIME 45- Mailing list 46- Webmail (Hotmail, Yahoo and Gmail) 47- HTTP 48- Browser 49- Search engine 50- Helper applications: Plug-ins, players 51- Chat and text messaging 52- Domain name server 53- URL and IP address. 54- Sorting and selection queries 55- Data-warehouse 56- Data-mart 57- Storing names in a database 58- Relationship in database 59- Types of e-commerce 60- disintermediation 61- Store front 62- shopping cart 63- cookies 64- M-commerce 65- E-tailing 66- Digital certificate 67- Authentication technologies 68- Biometrics 69- Virus 70- Worm 71- Denial of service attack 72- Trojan horse 73- Back-door Trojan-Horse is designed to open computer ports and allow hackers to get in. 74- Hoax and spam 75- Time bomb 76- Logic bomb 77- Zombies 78- Botnets 79- Trigger event and payload of a virus 80- Web server software deals with requests for web pages. 81- Functions of DBMS 82- File manager 83- Move/delete files (Clusters status) 84- Recycle bin. 85- Conversion decimal/binary, binary/decimal and HEX/binary and decimal.