1st Flashcards

1
Q

How many devices do you
need to form a network?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A collection of computing devices connected in
order to communicate and share resources

A

Computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connections between computing devices can be

A

Physical using wires or cables or wireless using
radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Functions of a Computer Network:

A
  • Communication
  • Resource Sharing
  • Information Access
  • Centralized Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The following are under of?
DATA TRANSFER
REMOTE ACCESS

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following are under of?
HARDWARE SHARING
SOFTWARE SHARING

A

RESOURCE SHARING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following are under of?
INTERNET CONNECTIVITY
DATABASE ACCESS

A

INFORMATION ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following are under of?
NETWORK ADMINISTRATION
SECURITY

A

CENTRALIZED MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Facilitates the transmission of data between
devices, such as files, emails, and messages

A

Data Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Allows users to access and control
devices and resources from remote locations

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enables the sharing of physical
resources like printers, scanners, and storage devices

A

Hardware Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows multiple users to access and utilize shared software applications

A

Software Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides access to the vast
amount of information available on the internet

A

Internet Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enables access to centralized
databases for data storage and retrieval

A

Database Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Allows for centralized
management and monitoring of network devices and
resources

A

Network Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enhances security measures to protect network
resources from unauthorized access

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is how a hardware is (physically) connected

A

Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is how a message’s destinations are identified

A

Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It concerns if all data should be sent in the same fashion?

A

Message Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What path through the network is taken?

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Any device on a network

A

Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The speed with which data is moved from
one place to another on a network

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Refers to the amount of data that can be
transmitted and received during a specific period of time.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Measures delay. Delay is simply the time taken for a data packet to reach its destination after being sent.

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is any computer hardware or software device
that requests access to a service provided by a server.

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is a computer program or device that provides a
service to another computer program and its user, also
known as the client.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In technical terms, ________ is the
data transfer rate that a network
connection can support.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In the context of data, throughput is the ________ that is sent over a network.

A

actual data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In the context of data, throughput is the actual
data transfer rate that is sent over a network. It
is also measured in bits per second (bps). Various
factors can affect throughput—such as ________.

A

network traffic, processing power, packet loss, etc.

30
Q

It’s the time it takes for a packet
of data to travel from the source
to the destination.

A

Latency

31
Q

Computer networks have opened up an
entire frontier in the world of computing
called the

A

client/server model

32
Q

A set of rules that defines how data is formatted and
processed on a network; i.e., rules that allow client/server
interaction

A

Protocol

33
Q

A computer that stores and manages files for multiple
users on a network

A

File server

34
Q

A computer dedicated to responding to requests (from the browser client) for web pages

A

Web server

35
Q

a physical arrangement through which various endpoints and links in an enterprise network communicate with each other

A

Network Topology

36
Q

Some common physical network topologies used by organizations include

A

point to point, bus, ring, star, tree, mesh, and hybrid topology networks.

37
Q

A simple topology that directly links two nodes and reserves
the entire bandwidth of the connection for them to
communicate with one another.

A

Point to Point

38
Q
  • Superior bandwidth, as only two nodes use the link
  • High speed when compared to other types of network topologies
  • Simple to implement
  • Easy to maintain and handle
  • Low instances of latency
A

Point to Point Topology

39
Q
  • Only applicable for small areas with nodes physically close to each other
  • High dependence on the common link; if the link fails, the network goes down
  • Only useful if the network has two nodes; thus, not applicable for many modern use cases
A

Point to Point

40
Q

All the nodes are linked using a single cable with a
terminator on both ends. This configuration sees
one main cable acting as the backbone for the
whole network.

A

Bus Topology

41
Q

1) The server node transmits data from
one end of the cable and in a single
direction to the client node.
2) As the data travels to each node, its
destination address (MAC/IP) is
checked to see if it is received and
processed.
3) If there is a mismatch in the address,
the node does not do anything with the
data.

4) Once the data reaches the end of the
cable, the terminator removes it to
prevent signal bouncing.

A

Bus Topology

42
Q
  • Easy to add new devices and replace or remove existing devices without affecting other devices connected to the network
  • Failure in a few devices does not affect other devices, or the network
  • Less cable is required when compared to other network topologies such as mesh and star; the cable can be extended easily whenever required
A

Bus Topology

43
Q

Each node is linked with its neighbor to form a
closed network. This configuration sees the data
move from one node to another, either
unidirectionally or bidirectionally.

A

Ring Topology

44
Q

Each networked device is connected to two
others, like points that form a circle.
Together, devices in a ring topology are
called a

A

ring network

45
Q

The term “_____” describes a segment of
information (like a packet) sent through that
circle. When a computer on the network can
decode that token, it receives data.

A

token

46
Q

All nodes are connected to a central hub using a
communication link. Each node needs a separate
wire to establish a point-to-point connection with
the hub, which functions as a server to control and
manage the entire network.

A

Star Topology

47
Q

In a tree topology, nodes are arranged in
a configuration that resembles a tree’s
leaves, branches, and trunk.

A

Tree Topology

48
Q

are suitable for large
networks such as offices, university
campuses, and hospitals.

A

Tree topologies

49
Q

In a ________, all the nodes are interconnected and
can send and receive their data and relay data from other
nodes.

A

Mesh Topology

50
Q

This is usually reserved for critical networks as they are
extremely costly to implement and challenging to maintain.

A

Mesh Topology

51
Q

Features characteristics of multiple other topologies. The creation of such a
configuration depends on the requirement of
the network.

A

Hybrid Topology

52
Q

Two most commonly used hybrid topologies
are ______ and _______. In the former, the
central hubs of multiple star topologies are
linked using a ring topology. In the latter, the
hubs of numerous star topologies are
connected using a bus topology.

A

star-ring and star-bus.

53
Q

A network that connects local-area networks over a
potentially large geographic distance

A

Wide-area network (WAN)

54
Q

The communication infrastructures that have been
developed in and around large cities

A

Metropolitan-area network (MAN)

55
Q

a collection of devices connected together in one physical
location, such as a building, office, or home.

A

Local-area network (LAN)

56
Q

A wide area network that spans the planet

A

Internet

57
Q

One particular set up to handle all communication going between that
LAN and other networks

A

Gateway

58
Q

A set of high-speed networks that carry
Internet traffic.

A

Internet backbone

59
Q

is the first Internet Exchange
Point in the Philippines.

A

Philippine Internet
eXchange

60
Q

A company that provides other companies
or individuals with access to the Internet

A

Internet service provider (ISP)

61
Q

2 Categories of Transmission

Media

A

Guided(wired) and Unguided(wireless)

62
Q

It is also referred to as Wired or Bounded
transmission media. Signals being
transmitted are directed and confined in a
narrow pathway by using physical links.

A

Guided Media

63
Q

3 Major Types of Guided

Media

A
  • Twisted Pair Cable
  • Coaxial Cable
  • Fiber Optic Cable
64
Q

This type of cable has the ability to block interference and does
not depend on a physical shield for this purpose. It is used for
telephonic applications.

A

Unshielded Twisted Pair (UTP)

65
Q

This type of cable consists of a special jacket to block external
interference. It is used in fast-data-rate Ethernet and in voice and data
channels of telephone lines.

A

Shielded Twisted Pair (STP)

66
Q

It has an outer plastic covering containing 2 parallel conductors each having a separate insulated protection cover.

A

Coaxial Cable

67
Q

Coaxial cable transmits
information in two modes:

A

Baseband mode(dedicated cable bandwidth)
and Broadband mode(cable bandwidth is split into separate ranges)

68
Q

It uses the concept of reflection of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for transmission of
large volumes of data.

A

Fiber-Optic Cable

69
Q

RJ45, stands for

A

Registered Jack-45

70
Q

Two wiring schemes–
_____ and _____–are used to terminate
the twisted-pair cable onto the connector
interface.

A

T568A and T568B

71
Q

are the termination standards used by
Internet backbone infrastructure, Internet providers and all
the way down to homeowners or businesses.

A

T568A and T568B

72
Q

The general rule of thumb when it comes to comparing these two
wiring types is that straight-through
cables are used for ______ devices
and crossover cables are used for
_____ devices.

A

dissimilar; similar