1. What is a computer network? Draw a diagram of a P2P computer network.
2. What are the major functions of Hubs, Switches, and Routers in computer networks? 3. What is Client/Server Computing? Draw a diagram of Client/Server technology. 4. What is Packet Switching? Draw a diagram to show how it works. 5. Define the followings: Protocols, TCP/IP, Analog signal, Digital Signal, Modem, DNS, VoIP, VPN, URL, SEO, Shopping Bots, 6. What is the Internet? Draw a diagram of the Internet. 7. (and any diagram drawn in class)
CHAPTER 7 Essay Question
Draw the diagram of TCP/IP reference model by DOD. Briefly describe each layer in the model.
CHAPTER 8 Short Questions
1. Why systems are vulnerable?
2. Why is the Internet Vulnerable? 3. Define the followings: Computer Virus, Worms, Trojan horse, SQL Injection Attacks, Spyware, Key loggers, Hacker, Cracker, Spoofing, Sniffer, DDoS, Identity Theft, Phishing, Evil Twins, Pharming, Click Fraud, Firewall, 4. What is a Botnet? Draw a diagram of a Botnet. 5. What is Encryption? Draw a diagram to show the method of encrypting. 6. (and any diagram drawn in class)
CHAPTER 8 Essay Questions
1. Briefly describe different types of malicious software. 2. Briefly describe the methods to protect information systems. Draw a diagram of PROTECTED computer network.
CHAPTER 4 Short Questions
1. Define the followings: Ethics, Profiling, Liability, Due process.
2. What are the different Ethical Principles? (page 166) 3. List the five moral dimensions of the information age. (p 160)
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)