Answers to Chapter 5-6: Define Terms and Questions
1. Cyberbank: A virtual bank that has no physical facilities and offers products and services solely on the internet.
2. Brick and Click: A business that allows customers to conduct business or complete transactions at a physical location as well as online at a web site.
3. Brick and Mortor: The old traditional way of conducting a business transaction, primarily in person at a physcial location, over the phone, or using paper-based transactions.
4. Sticky Website: An interactive website that users visit often and browse for long periods of time.
5.Drilling Down: A process where the user moves from categories to sub-categories, to a useful link and finally, through to the website. One can say it is like leaving a breadcrumb trail that shows the hiearchal arrangement of the users previous links.
6. Cyberslacking: A form of abuse of business computers by employees; whereas they misuse the company computers for personal use.
7. Who was "Bluetooth" named after?
"Bluetooth" was the code name used by Ericsson Electronics to honor a Danish King, Herald Blatand (940 - 985ce.) It is rumored that the king got his name from the fact that he had black hair which is unusual for a Viking, but also because he enjoyed 'blueberries' so much that it caused his molars to be tainted blue.
8. Enterprice Information Portal (9EIPs): Corporate portals control access to company information and business processes based on each user's personal profile.
9. Four ways to use FTP:
a. Anonymous FTP are Public FTP sites where anyone can log onto varies websites using "Anonymous" as their user name.
b. Private FTP are websites operated by a private company for its employee's use and that restricts access to authorized users, who must enter a unique user name and password.
c. Command Line Interface provides a non-graphical interface in which you can enter commands to use FTP and the "Command Prompt" window. You than enter a series of commands to log on to the FTP site and download and upload your files.
d. FTP Client is a program that offers an easy-to-use graphical user interface containing menu commands and toolbar shortcuts. The program is genrally a function of any Windows Explorer, or similiar web browser.
10. Shopping Aggregator: Sometimes called a "Shopping Bot" has computer programs that search the web and build an index or database. A user enters keywords or phrases, the program searches its datbase to find the product that matches the search. Two types of shopping bots are, NexTag.com and MySimon.com.
11. MACaddress: A unique physical address assigned to every node (device) on a network such as a network interface card (NIC) by the manufacturer.
12. Hub: Is an inexpensive hardware device used to connect multiple nodes on the same network such as a Peer to Peer (P2P) local access network LAN.
13. Passive Hub: Is a node (device) that cannot determine how to direct a packet. The hardware device simply sends the same signal to all nodes or segment which it is connected to.
14. Intelligent Hub: This type of hardware device is design to perform a variety of tasks, such as filtering, or permitting a networks traffic to be monitored by an administrator.
15. Bridge: Basically is an intelligent connectivity device (node) with one input and one output port that connects two segments on the same LAN or two seperate local access network.
16. Port: An opening in a hardware device that is used to connect another device (node).
17. Static Routing: Is primarily controlled by an administrator who routes packets over specific paths between nodes.
18. Dynamic Routing: Allows a router to determine the best route between two nodes (device) automatically and than store the information in a "routing table".
19. Network Interface Card (NIC): Is an internal expansion card that enables a computer or other devices to access a network.
20. Data Switches: An intelligent device that also interpets MAC addresses and filters and forwards packets to other network segments. A data switch has multiple ports, with each port acting as a bridge.
21. Firewall: Is a combination of hardware and software that filters traffic between private networks or between private networks and public networks by blocking incoming and outgoing traffic using a predetermined set of rules established by an administrator. The most common types of firewall is a "Packet-Filtering Firewall" or "Proxy Server".
22. War Driver: The act of searching for WI-FI wireless networks by a person in motion using a portable computer or PDA. Software for War Driving is freely available on the internet.
23. Hop: Forwarding a packet to the next internet router. The more hops, the longer it takes for data to go from the sending computer to the destination computer.
24. Intenet Routers: Are intelligent hardware devices with multiple ports. Unlike a data switch, a router is a much more powerful unit. Routers are in fact "Specialized Computers" that can connect to LAN segments, or multiple LANs and WLANs. All transmit at differnt speeds and use different protocals.
25. Tracert: Traces hops from one computer to another computer over the internet. "Tracert Utility" can be used ro test the path to a - destination internet - site and check for any problems.
26. Gateways: A hardware device or software that runs on a mainframe computer, server, an individual workstation, or a router. They are used to connect two or more networks or network segments that use different packet formatting, communications protocal, and different access methods. Gateways also translate packets.
27. Peer to Peer Network: allows files to be transferred between individual PCs located on the same LAN or between individual PCs connected to the internet. P2P file sharing networks allow the user to share material such as music, video, movies and software. Unfortunately the abuse of protected copyright laws and piracy have made a negative impact on the use of P2P networks.
28. The ability of a Client/Server LAN to support shared data storage, provide network maintenance tool, and promote more efficient data backup's, offers an advantage over P2P LANs. With extensive security features built into a client/server network operating system it provides yet another advantage over P2P networks.
29. Please see reverse side of homework printout for drawing of three network topolgies and access method that each have.
30. Denial of Service Attack(DDoS): Involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond. Basically they are virus and malware program attacks launched by arrogant student or by criminals attempting to extort businesses, or seeking revenge.
Monday, December 14, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment