You are on page 1of 2

COMP112 9.

Computer networking
WEEK 10: ➢ is the practice of interfacing two or
more computing devices with each
1. Mesh network topology
other for the purpose of sharing
➢ Devices are connected with many data.
redundant interconnections
10. Star Network Devices
between network nodes.
➢ are connected to a central
2. Simple Mail Transfer Protocol (SMTP)
computer, called a hub.
➢ is an application layer protocol
11. Simplex transmission mode
that is used to transmit electronic
mail. ➢ the sender can only send the data,
and the receiver can only receive
3. Half duplex transmission mode
the data.
➢ the sender and receiver can both
send and receive the information,
WEEK 11:
but only one is allowed to send it
at any given time. 1. Neural network
4. Transmission control protocol (TCP) ➢ a computer program that operates
in a manner inspired by the
➢ is responsible for routing
natural neural network in the
application protocols to the correct
brain.
application on the destination
computer. 2. The internet of things or IoT
5. The Internet Backbone ➢ are a system of interrelated
computing devices, mechanical
➢ is made up of many large networks
and digital machines, objects,
which interconnect with each
animals, or people that are
other.
provided with unique identifiers
6. Transmission (UIDs)

➢ is actually the process of sending 3. Natural Language Processing (NLP)


and propagating analog or signal
➢ refers to the AI method of
digital information.
communicating with an intelligent
7. Distributed system system using a natural language
such as English.
➢ consists of a collection of
autonomous computers linked by 4. Robotic process automation (RPA)
a computer network and equipped
➢ is the technology that allows
with distributed system software.
anyone today to configure
8. Full-duplex transmission mode computer software.

➢ is like a two-way road, in which 5. Artificial intelligence (AI)


traffic can flow in both directions
➢ is a wide-ranging branch of
at the same time.
computer science concerned with
building smart machines capable
of performing tasks that typically
require human intelligence
6. Machine learning vulnerabilities on the show and
then charge the owner a fee to
➢ is an application of AI that enables
repair it.
systems to learn and improve from
experience without being explicitly 7. Intellectual property
programmed.
➢ Refers to creations of the mind,
7. Deep learning such as inventions; literary and
artistic works; designs, and
➢ allows machines to solve complex
symbols, names, and images used
problems even when using a data
in commerce.
set that is very diverse,
unstructured, and inter-connected. 8. Black hat hackers
➢ Malicious hackers, also known as
crackers, hack into systems with
WEEK 13:
the intent to steal or vandalize.
1. Copyright
9. Viruses
➢ is a form of intellectual property
➢ A computer program that spread
right and refers to the legal term
from one computer to another.
used to describe the rights that
creators have over their literary 10. Patent
and artistic works.
➢ is an exclusive right granted by the
2. White hat hackers state for the protection of an
invention.
➢ Non-malicious hackers, like
company employees, test the
security of the firm's own
computer system by trying to
break into it.
3. Hackers
➢ computer experts who can create
and alter computer code and enter
computer systems undetected.
4. Trademark
➢ Is a sign capable of distinguishing
the goods or services of one
enterprise from those of other
enterprises.
5. Privacy
➢ Refers to an individual's control
over the extent, timing, and
circumstances of sharing personal
information.
6. Grey hat hackers
➢ Break through a system without
authorization in order to put

You might also like