Chapter 1 Flashcards

1
Q

What is a Network?

A

A network is a group of computers and other devices (Such as printers) that are connected by some type of transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Physical Topology?

A

Refers to a network’s hardware and how computers, other devices, and cables or radio signals work together to form the physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Logical Topology

A

logical topology refers to the way software controls access to network resources and how those resources are shared on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of an OS?

A

It provides a set of essential services and functions that allow the computer’s hardware and software applications to communicate and interact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a P2P network work?

A

Devices in a peer-to-peer network can share resources through various techniques of file sharing or user accounts. Most OSs offer options for sharing files with peered devices, even if those devices are running different OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are P2P Networks scalable?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NOS and what is it’s function in the client-server model?

A

The software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. Popular examples of network operating systems are Windows Server, Ubuntu Server, and Red Hat Enterprise Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the clients purpose in the client-server model?

A

Making requests to the server. Clients on a client-server network can run applications installed on the desktop and store their own data on local storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What must the client and server agree on to continue the request?

A

On the “Protocols” they will use to commuincate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two primary network protocols?

A

TCP (Transmission Control Protocols)
IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the meaning of AD?

A

(Active Directory)
The centralized directory database that contains user account information and security for the entire group of computers on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some Advantages does a client-server network have over a P2P

A
  • Problems on the network can be monitored, diagnosed, and often fixed from one location.
  • Client-server networks are more scalable than peer-to-peer networks. In other words, it’s easier to add users and devices to a client-server network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a client-server application?

A

Data or a service requested by one computer from another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What client-server application is this?
A _____ serves up web pages to clients. Many corporations have their own ________, which are available privately on the corporate network. Other _______ are public, accessible from anywhere on the Internet.

A

(Web servers)
Web Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What client-server application uses SMTP and IMAP4?

A

Email Services
SMTP
(Simple Mail Transfer Protocol)
IMAP4
(Internet Message Access Protocol, Version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does DNS service help the client do?

A

Helps clients find web servers over a network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is SSL and TLS?

A

SSL stands for Secure Sockets Layer. It’s a standard security protocol used to establish an encrypted link between a web server and a browser.

TLS ensures the privacy and integrity of data transmitted between devices or applications over a network, such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the primary protocol “HTTP” do?

A

HTTP (Hypertext Transfer Protocol)
An application layer protocol that formulates and interprets requests between web clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is “HTTPS” different than “HTTP”?

A

HTTP (Hypertext Transfer Protocol Secure)
When HTTP is layered on top of encryption protocols SSL or TLS it results in HTTPS which provides a more secure transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is DBMS? and what langauge does it use?

A

A DBMS (database management system) is software installed on the database server. It is responsible for making requested changes to the data and organizing the data for viewing, reporting, or exporting.
SQL (Structured Query Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a LAN?

A

LAN (local area network)
A network of computers and other devices that typically is confined to a relatively small space, such as one building or even one office. Each node on a LAN can communicate directly with others on the same LAN.

22
Q

A ____ receives incoming data from one of its ports and redirects it to another port or multiple ports that will send the data to its intended destination(s) within the local network.

A

Switch

23
Q

What physical Topology does all devices connect to one central device, the switch.

A

Star Topology

24
Q

A topology in which a single cable connects all nodes on a network without intervening connectivity devices.

A

Bus Topology

25
Q

What is it called when there is a combonation of more than one topology

A

Hybrid Topology

26
Q

A topology in which a central networking component, such as a switch, connects to multiple peripheral networking components that each connect to endpoint devices in their areas.

A

Hub-and-spoke Topology

27
Q

____________ is a network configuration where devices are interconnected in a decentralized manner. Instead of relying on a central hub or switch, each device connects directly to multiple other devices, forming a mesh-like structure.

A

Mesh Topology

28
Q

What topology is this?
A network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle.

A

Ring Topology

29
Q

What is the fundemental difference between a router and a switch

A

A router is that a switch belongs only to its local network and a router belongs to two or more networks—the router acts as a gateway between multiple networks, but a switch (even if there are multiple switches) can only communicate within a single network.

30
Q

How is a Host different from a node?

A

A host is any endpoint device, such as a computer or printer, connected to a network that hosts or accesses a resource such as an application or data. A node is any device, such as a router or switch, connected to a network that can be addressed on the local network or managed through a network connection.

31
Q

Can a Client Computer serve as a host and a node?

A

Yes,
A client computer or server is both a node and a host, but a router or switch does not normally host resources and is, therefore, merely a node on the network through which network traffic passes.

32
Q

How do LANs relate to a WAN?

A

A group of LANs that spread over a wide geographical area is called a WAN

33
Q

A group of connected LANs in the same geographical area is known as a?

A

MAN (Metropolitian area network)

34
Q

Cool fact: The Internet is the largest and most varied WAN in the world.

A

Keep it moving

35
Q

What network is formed wh en personal devices, such as the network you use when you sync your smartphone and your computer.

A

PAN (Personal area network)

36
Q

Speed Round:
What are these networks?
BAN
SAN
WLAN

A

BAN (Body Area Network) - Made up of personal fitness devices like a smartwatch, fitness tracker, AR (augmented reality) headset, AI (artificial intelligence) hearing aid, or other wearable devices.

SAN (Storage Area Network) - Consists of high capacity data storage devices in a distinctly defined network segment.

WLAN (Wireless Local Area Network) - Consists of two or more devices connected wirelessly.

37
Q

What is
A seven-layer model was developed to categorize the layers of network communication.

A

OSI (Open Systems Interconnection) Reference Model

38
Q

OSI Study Help:
All People Seem To Need Data Processing
(Application, Presentation, Session, Transport, Network, Data link, and Physical).

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
39
Q

What is the application layer and what are applications two categories that fall under the application protocols?

A

The application layer (7) does not contain applications themselves, such as a web browser, but instead describes the interface between two applications, each on separate computers.

  • Applications that provide services to a user, such as a browser and web server using the HTTP application layer protocol
  • Utilities that provide services to the system, such as SNMP (Simple Network Management Protocol)
40
Q

Data that is passed between applications or utility programs and the operating system is called

A

Payload

41
Q

What is the number and responsibility of the presentation layer?

A

Layer 6.
is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

41
Q

What layer is this example refering to?
“the Zoom application works with the operating system to establish and maintain a session between two endpoints for as long as a voice conversation or video conference is in progress.”

A

Layer 5 Session layer
The fifth layer in the OSI model. The session layer describes how data between applications is synced and recovered if messages don’t arrive intact at the receiving application.

42
Q

What layer is the Transport layer and what is its responsibility?

A

The transport layer is responsible for transporting application layer payloads from one application to another.

42
Q

What transport layer protocol layer guaranteess delivery?
TCP or UDP

A

TCP (Transmission Control Protocol)
Makes a connection with the end host, checks whether the data is received, and resends it if it is not.

43
Q

Which layer Is responsible for moving messages from one node to another until they reach the destination host.

A

Network Layer (3)

44
Q

What are Layers 1 and 2 Responsible for?

A

Layers 2 and 1 are responsible for interfacing with the physical hardware on the local network. The protocols at these layers are programmed into the firmware of a computer’s NIC and other networking hardware.

45
Q

What is an example of layer 2

A

Data Link (2)
Examples of data link layer protocols are Ethernet and Wi-Fi. Ethernet is used by switches on wired networks and Wi-Fi is used by access points for wireless networks.

46
Q

What is the Physical Layer?

A

Layer 1, the physical layer, is responsible for sending bits via a wired or wireless transmission. These bits can be transmitted as wavelengths in the air (for example, Wi-Fi), voltage on a copper wire (for example, Ethernet on twisted-pair cabling), or light (for example, Ethernet on fiber-optic cabling).

47
Q

What is the first step to Troubleshooting?

A

Identify the problem and it’s symptoms

48
Q

What is the last step for troubleshooting?

A

Document findings, actions, and outcomes

49
Q

What is Fail-Open?

A

“Fail-open” refers to a system or device that, in the event of a failure, defaults to an open state or condition. This means that if something goes wrong, the system will allow the flow of data or energy to continue rather than shutting down completely.

50
Q

What is Fail-Close?

A

“Fail-close” refers to a system or device that, in the event of a failure, defaults to a closed state or condition. In other words, if something goes wrong, the system will shut down or block the flow of data or energy to prevent any further damage or unauthorized access.