3. Networks Flashcards

1
Q

Define ‘network,’ ‘node,’ and ‘protocol’ in computer networks. (3 marks)

A

Network: Interconnected devices sharing resources (1).
Node: A device within the network, e.g., computer or printer (1).
Protocol: Set of rules for communication, e.g., TCP/IP (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the role of a router and how it differs from a switch. (4 marks)

A

Router: Directs data between networks, connects to internet (2).
Switch: Connects devices within the same network, does not route traffic between networks (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain differences between LAN, WAN, and VPN, with examples. (6 marks)

A

LAN: Local network within a small area, e.g., office network (2).
WAN: Wide network across large areas, e.g., international corporate network (2).
VPN: Secure connection over the internet, e.g., remote work access (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the purpose of network protocols and give two examples. (4 marks)

A

Purpose: Enable standardized communication across devices (1).
Example 1: HTTP for web data transfer (1).
Example 2: FTP for file transfer between servers and clients (1).
Importance: Ensures compatibility and efficient communication (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ‘bandwidth’ and explain its importance in network performance. (3 marks)

A

Definition: Maximum data transfer rate of a network (1).
Importance: Higher bandwidth = faster data transfer (1).
Impacts speed and efficiency of network tasks (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe wired and wireless networks; list two advantages and disadvantages of each. (6 marks)

A

Wired: Physical cables, faster and more secure (2).
Wireless: Uses radio waves, more flexible but less secure (2).
Advantages/disadvantages for each type (1 mark per advantage/disadvantage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the role of a Network Interface Card (NIC) in network communication. (3 marks)

A

NIC: Enables device to connect to a network (1).
Provides hardware MAC address for communication (1).
Allows both wired and wireless connections (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compare two types of transmission media: fiber optic and coaxial cable. (4 marks)

A

Fiber Optic: High speed, high reliability, expensive (2).
Coaxial Cable: Moderate speed, reliable, more affordable (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain ‘network topology’ and describe two common topologies. (6 marks)

A

Definition: Physical or logical layout of a network (1).
Star: Central hub connects to all nodes; reliable but dependent on hub (2).
Mesh: Each node connects to others; high reliability, high cost (2).
Purpose: Optimizes network performance and management (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discuss impact of wireless transmission technologies on security. (5 marks)

A

Security issues: Signal interception, unauthorized access (2).
Technologies: Wi-Fi, Bluetooth vulnerabilities (1).
Mitigation: Use encryption and secure authentication (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain data encryption and describe one encryption method. (4 marks)

A

Encryption: Secures data by converting it into unreadable form (1).
Method: AES (Advanced Encryption Standard) for data security (2).
Purpose: Protects data from unauthorized access (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘firewall’ and describe its role in network protection. (3 marks)

A

Firewall: Network security device controlling traffic flow (1).
Filters data based on security rules to block threats (1).
Protects network from unauthorized access and attacks (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discuss two security threats (e.g., phishing, malware) and their impact. (6 marks)

A

Threat 1: Phishing tricks users into revealing sensitive info (2).
Threat 2: Malware infects systems, may steal or corrupt data (2).
Impact: Both can lead to data breaches, financial losses (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe two user authentication methods, like MFA and biometrics. (4 marks)

A

MFA: Combines multiple authentication factors, e.g., password + SMS code (2).
Biometrics: Uses physical traits like fingerprints, enhances security (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define ‘protocol’ and explain the purpose of the TCP/IP model. (4 marks)

A

Protocol: Rules governing communication across networks (1).
TCP/IP: Model for standardized internet communication (1).
Purpose: Ensures compatibility and reliable data transfer (2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare OSI and TCP/IP models; explain TCP/IP layers. (6 marks)

A

OSI Model: Seven layers, ideal framework for networking (2).
TCP/IP Model: Four layers, practical for internet use (1).
TCP/IP Layers: Application, Transport, Internet, Network Access (3).

15
Q

Explain HTTPS protocol and how it differs from HTTP. (4 marks)

A

HTTPS: Secure version of HTTP with SSL/TLS encryption (2).
Difference: Encrypts data for privacy and security in transit (2).

16
Q

Describe DNS function and how it helps users access websites. (4 marks)

A

DNS: Translates domain names to IP addresses (2).
Function: Allows users to access sites by names instead of numbers (2).

17
Q

List and explain the four layers of the TCP/IP model. (6 marks)

A

Application: User interface layer, e.g., HTTP, FTP (1.5).
Transport: Manages data flow, e.g., TCP, UDP (1.5).
Internet: Handles addressing/routing, e.g., IP (1.5).
Network Access: Deals with hardware transmission (1.5).