4. Networks and the effects of using them Flashcards

1
Q

What is a computer network?

A

A computer networks consists of 2 or more computers or electronic devices such as printers that have been linked together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do networks enable us to do?

A

Share files
Send emails to each other
Share resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are networked computers joined together?

A

Cables
Radio signals
Telephone lines and satellites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages of computer networks

A

Resources such as printers, scanners and internet can be shared
Files and data can be shared
Easy to communication with people on the network
Access our data from any computer
Data can be backed up to a separate computer for security
Access huge amount of information and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disadvantages of computer networks

A

If part of the network fails, the whole network can break down
Viruses can spread across the network very easily and quickly
If a computer on the network is hacked into then all other computers are prone to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two types of computers that make up a network?

A

Servers

Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a server computer?

A

Powerful computers that provide ‘services’ to the client computers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Services provided by server computers

A

Providing central storage
Sharing devices
Providing network security
Sharing internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Different types of servers

A

File servers
Application servers
Printer servers
Proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a client computer?

A

A normal computer that is used to perform everyday tasks and to access info and programs from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of computer networks?

A

LAN
WLAN
WAN
Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LAN

A

Local Area Network
Usually located in a single room or small building.
Private and can only be accessed by people in the room/building.
e.g. a school network is only used by students of that school.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ads + disads of LAN

A

Ads:
Save money as each computer can share resources
Files and data can be shared easily
Files and data can be accessed from any computer within the server
Data can be sent around very fast
Can be monitored easily

Disads:
Viruses can spread very quickly
Security can be an issue
The network can become unusable if the main server computer breaks down
Slow internet connections
High initial cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WLAN

A

Wireless Local Area Networks
Similar to LANs but they connect computers together wirelessly without cables.
e.g. home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ads + disads of WLANs

A

Ads:
physically safer as no cables are needed
cheaper to set up than a WLAN
easier to add more computers
devices such as printers and scanners can be connected to the network easily
computers and devices can be used anywhere in the building

Disads:
some areas might not be able to pick up the signal
security can be an issue
wireless signals can be unreliable
data transfer is slower than LAN
signal range is limited, so useless in a large building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WAN

A

Wide Area Network
made up of computers and devices that are connected in a large geographical area
created by connecting lots of LANs and individual computers together
computers and devices can connect to a WAN using telephone lines, fibre-optic cables and satellite signals
need a router or a modem
e.g. the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ads and disads of WANs

A

Ads:
computers can be connected over wide areas
files and data can be shard over a large area
users can communicate very quickly, over large areas
e-commerce
computers and devices can be used anywhere

Disads:
security can be an issue
easy to accidentally download viruses
data is transferred across a WAN is a lot slower than a LAN
monitoring a WAN is difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bluetooth (WPAN)

A

Wireless Personal Area Network (WPAN)

devices can connect to each other between 1 and 100 metres away from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ads + disads of bluetooth

A

ads:
very easy to connect
not easy to disrupt
works wirelessly so no messy cables
very little power needed

disads:
limited signal range
slow data transfer
very secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Internet

A

a computer network that connects computers worldwide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intranet

A

a private network within a company and it is only available to staff members of the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Local area networks (LAN) - describe

A

Not over a large geographical area (e.g. in one building)
Typical LAN will consist of a number of computers and devices
Devices and computers will be connected to hubs or switches.
One of the hubs or switches will usually be connected to a router and modem to allow the LAN to connect to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

LAN - Ads and Disads?

A

Advantages of Networking using LAN
The sharing of resources
Communication between users
Network administrator can control and monitor all aspects of the network
Disadvantages of Networking using LAN
Easier spread of viruses throughout the whole network
Increased security risk
If main server breaks down, usually the networks will no longer function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Different topologies

A

Star
Bus
Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Wireless LANs (WLANs) - describe
Do not involve any wiring or cabling Provide wireless network connection overs a short distance They use radio or infrared signal’s instead of cables Devices known as Access Points (APs) are used for a larger range APs usually use spread spectrum technology (larger range)
26
Wireless LANs (WLANs) - Ads and disads?
Advantages All computers can access the same services and resources No cabling is involved The system is more flexible Adding new computers and devices is very easy Cost is reduced and safety is improved Disadvantages Security is an issue Problems and interference can affect the signal The data transfer is slow than in the wired LAN
27
Wi-Fi - describe
Any system which allows you to connect to a network or computer through wireless communication Examples : o WLANs o Tablets o Laptop computers o Peripheral devices such as printers
28
Wi-Fi Hotspots - describe
Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send signals Wi-Fi hotspots are places where you can access Wi-Fi (free or paid) Hotspots are found in public places like Airports, hotels and cafés
29
Bluetooth - describe
Bluetooth is an example of wireless personal area networking (WPAN) technology Spread spectrum transmission (radio waves) is used to provide wireless links between to devices such as mobile phones and allow connection to the internet A small home network can be created with this system Used to transfer photos from camera to a mobile phone. It behaves like a mini-LAN
30
Wide area networks - describe
WAN is formed by a number of LANs being connected together through a router or a modem e.g. the Internet is a WAN Some companies set up Private WANs, it is expensive however it comes with a much enhanced security It is common to use an Internet service provider (ISP) for connections to the internet and communicate via this network system Additional hardware is needed for a WAN: Routers, modems and proxy servers
31
Modems - describe
It stands for modulator demodulator. Converts computer’s digital signals (modulates it) into analogue for transmission through telephone lines. Reverse this process- analogue signal from a telephone line into digital for a computer to process the data. (demodulates it) The main use it to connect to computer networks over long distances using existing telephone lines.
32
Network Hubs - describe
They are devices that can have multiple devices connected to them. Main task is to receive data from different ports and send it to each device The information will be received to the device whether its relevant, or not
33
Switches - describe
More efficient than hubs in distributing data. Each device has an access control media address MAC which identifies it uniquely MAC is a number unique to each device connected to the network (like fingerprints) Data sent will have a mac address which tells the source and receiving device.
34
Bridges - describe
It connects 2 different types of networks together e.g. a bus and star network It can only connect networks that use the same way for handling messages They do this by changing the form of message to suite the different type of network
35
Routers - describe
Acts like a bridge, yet can link between two or more networks Makes decisions on messages being passed between the networks Formats the messages making it suitable for the new network Reads information about the message and decides where the message should go and the best route for it to get there Used to provide a connection between a network and the internet You need an ISP account to have access to the internet (internet server provider)
36
HTTP Proxy Server - describe
Type of server that acts as a buffer between a WAN and a LAN. Retrieves web pages and passes them onto the computer that made a request. Stores any page retrieved on the server, which means that when a different computer requests the same page it would be available. Speeds up the browsing process
37
The Internet - describe
The Internet is a worldwide collection of networks. It allows for web browsing, gaming, file sharing, video and email. User can access by web browser.
38
Websites - describe
Web is made up of millions of websites and web pages Web pages are documents on a computer screen containing
39
Uniform Resource Locator (URL) - describe
Web browsers use URLs to retrieve files. They are standard way of locating on the internet Standard form: 4 numbers e.g. 194.106.220.19 Also alphanumeric form: protcol://site address/path/filename Where; Protocol is usually http Site address consists of: computer name, domain name, domain type, and country code Path is the web page Filename is the item on the page
40
ADSL modems - describe
Operate at 11,000 kilobits/sec. Faster at downloading than uploading They don’t tie up the line while accessing the internet
41
Intranets - describe
It is an internal website that is setup internally for companies and can be accessed by employees for the purpose of standard documents or information and many items of information and data. They use internet protocols i.e. a browser
42
Intranets - advantages
Safer and less chance of hacking Possible to prevent employees from accessing unwanted sites Companies ensure that info. available is specific to their needs Easier to send sensitive messages that remain within a company
43
User IDs - describe
To log on to a network, a user must type in a user ID User ID assigns user privilege once user logs in The top level privilege for a network is an administrator: Able to set passwords and delete files from server etc. User privilege may only allow to access their own work area
44
Passwords - describe
After typing in user ID, the user will be requested to type in their password. Generally, it is a combination of letters and numbers Passwords are shown as stars (***) so nobody overlooking can see it. Many systems ask for password to be typed in twice as a verification check, in case of input errors To help protect the system, user is has a finite number of attempts If password is forgotten, administrator has to reset it If password is forgotten on a website, it will be sent to your e-mail
45
Encryption - describe
The conversion of data to code by encoding it Done by using encryption software Since data is encoded, it appears meaningless to a hacker This technique does not prevent illegal access Necessary to use decryption software to decode the data Used to protect sensitive data e.g. banking details Encryption keys are complex algorithms which makes codes almost unbreakable
46
Describe authentication techniques
Biometric methods: finger print, retina scans, iris scans, face scans - using physical characteristics to authenticate access to systems magnetic stripe cards
47
Fax -describe
A system that scans documents electronically and converts them into a bit map image (a bit is a binary digit and is a 1 or a 0) Then transmitted as a series of electrical signals through the telephone network Receiving fax machine converts the electronic image and prints it out on paper It is also possible to generate fax signals from a computer to allow documents to be sent to a fax machine This saves printing out the document first and then passing it through the fax machine Fax/modem software in the computer converts the image into a form fax machines can recognise
48
Email - describe
A method for sending text and attachments from one computer to another over a network
49
Email - ads and disads?
Advantages Speed of sending and receiving replies is quick Low cost (no stamps, paper etc.) Not needing to leave home to send the mail Disadvantages Possibility of virus threats and hacking Need for the email address to be correct Inability to send bulky objects via emails Don’t always get immediate response
50
Video Conferencing - describe
This is a method of communication between people at 2 or more separate locations It is done in real time and makes use of LAN, if internal, or WAN if through the internet. Uses hardware like; webcam, microphones, speakers and monitors It also uses special software like CODEC converts and compresses analogue data into digital data to send down digital lines. How it works Delegates at one end speak into a microphone and look into the webcam. The other delegates can see them and hear them using speakers and monitors, However there are several problems with these as the conference call often lags and quality is not always high. Also, as travelling tickets increase in price, terrorists can use this way of communicating with each other, increasing risk.
51
VOIP - describe
VOIP (Voice over internet protocol) is a method used to talk to people over internet VOIP converts sound (picked up by a microphone) into discrete digital packets that can be sent to a destination via internet The biggest advantage is that it is free and can be used all over the world The biggest disadvantage is that sound quality is usually bad.
52
General security issues - describe
Identity and service theft Viruses and malware Spamming (sending junk mail) Phishing attacks (the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam user in different ways
53
What is LAN?
Local Area Network
54
What are the features of LAN?
PCs located usually in the same building computers connected by cable does not require a modem requires a server
55
What is WAN?
Wide Area Network
56
What are the features of WAN?
the internet is the largest WAN PCs connected by telecomunications or wireless mormally spread over various distant areas requires a modem requires a phone/dedicated line computers/LAN can be large distances apart
57
What is WLAN?
Wireless Local Area Netweork
58
What are the features of WLAN?
links 2 or more devices using some wireless distribution method usually provides connection throughan access point to the wider internet gives the user the mobuility to move around within a local coverage area and still be connected to the network
59
What is Bluetooth?
used to connect 2 mobile devices to each other
60
What is the Internet?
INTERnational Network
61
What are the features of the Internet?
is a WAN can access from anywhere greater amount of information unlimited access
62
What is the Intranet?
INTernal Restricted Access NETwork
63
What are the features of the Intranet?
usually a LAN password controlled pages behind a firewall can set up specific information pages on Intranet systems Information within the school is easily accessible by all users can limit the places where users can go to study no wasted time looking through millions of resources Intranet is better protected for the use of emails/from viruses/from hackers
64
LAN stands for…
Local Area Network
65
WAN stands for…
Wide Area Network
66
A LAN consists of a number of computers that are…
linked together on a single site
67
A LAN spreads over a…
small geographic area
68
A LAN often uses … to link computers
copper cabling
69
A WAN consists of a collection of networks that are connected using a…
telecommunications link
70
A WAN spreads over a…
vast geographic area
71
A WAN uses … to link computers
fibre optic cabling or wireless technology
72
An advantage of using a network is that … can be shared
expensive peripherals
73
An advantage of using a network is that computers can … such as software
share resources
74
An advantage of using a network is that you can log on to…
any computer to access your files
75
An advantage of using a network is that a … may be stored on the file server for use by all on the network
single software copy
76
NIC stands for…
Network Interface Card
77
An NIC is necessary for each computer on a network so that it can…
communicate with devices on the network
78
An NIC connects the PC…
to the file server via a network cable
79
WNIC stands for…
Wireless Network Interface Card
80
A WNIC can be installed in a computer to allow it to…
connect to a wireless router
81
Network cables link computers…
to each other and the network
82
Network cables plug into the … and carry information…
NIC, to and from the file server
83
The file server is the … on the network
main computer
84
The file server is … than all the other components on the network
more powerful
85
The file server has a large amount of…
RAM and hard disk space
86
The file server manages…
file and network security across the network
87
The file server makes sure that only…
authorised users log on to the network
88
A typical file server holds… as well as…
application software such as Microsoft Office, user files created by users on the network
89
The switch connects the … and organises communication between the two
file server to the computers
90
The switch can send … to a particular computer
data packets
91
A router shares a…
network connection between the devices on the network
92
A router enables a LAN to…
connect to a WAN or the internet
93
A router can have … such as a firewall
integrated security features
94
A router can be … , providing an internet connection without the inconvenience of cables
wireless
95
Define the term protocol [2]
An agreed set of rules for sending or receiving data on a network
96
Network communications protocols are necessary to allow computers to…
communicate with each other
97
… provide translation from one protocol to another
Routers
98
What protocol does the internet use?
Transmission Control Protocol/Internet Protocol (TCP/IP)
99
List three basic network security measures.
Passwords Levels of access Encryption
100
Passwords prevent … from accessing the network
unauthorised users
101
List three characteristics or conventions of a strong password.
Minimum of 8 characters Alphanumeric Changed regularly
102
The function of levels of access is to…
limit the things that users can do on a network
103
Pupils, teachers and the system manager have…
different levels of access
104
The purpose of encryption is to keep data being sent across a network…
secure
105
Encryption is the process of…
encoding data that is to be sent across a network, making the data unreadable to anybody who intercepts it
106
Only a user with the … can decode the data when it arrives at its destination
encryption key software
107
NIC?
Network interface card -Used to allow a device to connect to a network
107
MAC address?
Media access control address -Number that uniquely identifies a device when connected to a network
108
IP address?
Internet Protocol address -A computer is given an op address when connected to a network
109
Hubs
Multiple devices connected and sends info to all
110
Switches
Multiple devices connected but only sends to specific one
111
Bridges
Connects 2 hubs/switches
112
Routers
Route data packets from 1 network to another
113
Advantages and disadvantages of cloud computing
Advantages: -Accesses any time, any device, anywhere -No external storage device -Remote backup -Cloud storage always recovery of data Disadvantages: -Security -Slow/unstable internet is a problem -High costs for large storage capacity -Power cuts -Hackers
114
LAN?
Local Area Network -Connected to hubs/switches -Usually within 1 building Advantages: -Sharing of hardware/software -Easy communication -Network administrator Disadvantages: - Easy to spread viruses -Queues for shared recourses -Slower access to internal networks -Higher risk then stand alone computers
115
WLAN
Wireless Local Area Network -No wires
116
All authentication methods
-No login -Biometrics -Magnetic stripe -Smart cards -Physical tokens -Electronic tokens
117
Anti-malware software
Running this software in the background constantly scans for virus attacks and to prevent them -Needs to be up to date!!
118
What is a computer network?
A computer networks consists of 2 or more computers or electronic devices such as printers that have been linked together
119
What do networks enable us to do?
Share files Send emails to each other Share resources
120
How are networked computers joined together?
Cables Radio signals Telephone lines and satellites
121
Advantages of computer networks
Resources such as printers, scanners and internet can be shared Files and data can be shared Easy to communication with people on the network Access our data from any computer Data can be backed up to a separate computer for security Access huge amount of information and files
122
Disadvantages of computer networks
If part of the network fails, the whole network can break down Viruses can spread across the network very easily and quickly If a computer on the network is hacked into then all other computers are prone to attack
123
What are the two types of computers that make up a network?
Servers Clients
124
What is a server computer?
Powerful computers that provide ‘services’ to the client computers on the network.
125
Services provided by server computers
Providing central storage Sharing devices Providing network security Sharing internet connections
126
Different types of servers
File servers Application servers Printer servers Proxy servers
127
What is a client computer?
A normal computer that is used to perform everyday tasks and to access info and programs from the server.
128
What are the types of computer networks?
LAN WLAN WAN Bluetooth
129
LAN
Local Area Network Usually located in a single room or small building. Private and can only be accessed by people in the room/building. e.g. a school network is only used by students of that school.
130
Ads + disads of LAN
Ads: Save money as each computer can share resources Files and data can be shared easily Files and data can be accessed from any computer within the server Data can be sent around very fast Can be monitored easily Disads: Viruses can spread very quickly Security can be an issue The network can become unusable if the main server computer breaks down Slow internet connections High initial cost
131
WLAN
Wireless Local Area Networks Similar to LANs but they connect computers together wirelessly without cables. e.g. home networks
132
Ads + disads of WLANs
Ads: physically safer as no cables are needed cheaper to set up than a WLAN easier to add more computers devices such as printers and scanners can be connected to the network easily computers and devices can be used anywhere in the building Disads: some areas might not be able to pick up the signal security can be an issue wireless signals can be unreliable data transfer is slower than LAN signal range is limited, so useless in a large building
133
WAN
Wide Area Network made up of computers and devices that are connected in a large geographical area created by connecting lots of LANs and individual computers together computers and devices can connect to a WAN using telephone lines, fibre-optic cables and satellite signals need a router or a modem e.g. the internet
134
Ads and disads of WANs
Ads: computers can be connected over wide areas files and data can be shard over a large area users can communicate very quickly, over large areas e-commerce computers and devices can be used anywhere Disads: security can be an issue easy to accidentally download viruses data is transferred across a WAN is a lot slower than a LAN monitoring a WAN is difficult
135
Bluetooth (WPAN)
Wireless Personal Area Network (WPAN) devices can connect to each other between 1 and 100 metres away from each other
136
ads + disads of bluetooth
ads: very easy to connect not easy to disrupt works wirelessly so no messy cables very little power needed disads: limited signal range slow data transfer very secure
137
Internet
a computer network that connects computers worldwide
138
Intranet
a private network within a company and it is only available to staff members of the organisation
139
What is cloud storage?
It is a method of data storage where data is stored on offsite servers. The physical storage covers hundreds of servers all over the world so data can be accessed anywhere.
140
What is data redundancy?
Data in clouds is stored on more than one server so that clients can access data at all times even during maintenance and repair.
141
Types of cloud storage.
Public cloud- customer and cloud storage provider are different companies Private cloud- Storage provided behind a firewall. Customer and cloud storage provider are one unit Hybrid cloud- Combination of private and public.
142
Advantages of storing data on a cloud instead of other devices.
Files can be accessed anytime, on any device, anywhere provided the user has internet access No need to carry around storage devices and use only specific devices Provides backing up and recovery of data Offers almost unlimited storage
143
Disadvantages of storing data on a cloud instead of other devices.
If internet connection is slow, accessing files could be hard Costs can be high if lots of storage is needed Failure of cloud storage can cause permanent loss of even backup data.