Chapter 4 Flashcards

1
Q

What is the primary function of a network in connecting computers and digital devices?

A

A network connects computers and other digital devices together and allows them to share data and
resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three main types of networks

A

Network types include local area networks (LAN), wide area networks (LAN) and wireless local area networks (WLAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Wi-Fi and Bluetooth contribute to wireless communication on a network?

A

Both Wi-Fi and Bluetooth are wireless forms of communication on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List five network hardware devices and describe their respective roles.

A

Network hardware devices include hubs, bridges, switches, network interface cards (NICs) and routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Differentiate between extranets, intranets, and the internet in terms of access control and usage.

A

Common network environments include extranets, intranets and the internet. Extranets are extensions to intranets; both are set up by organisations and access to them is strictly controlled whereas the internet can be accessed by everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the concept of cloud storage and its advantages.

A

Storing your data at a remote online location, that is connected to the internet, and is possibly in another country, is known as cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are online systems susceptible to attacks, and what potential risks are associated with them?

A

All online systems are subject to attacks by hackers and data can be stolen when it is stored or transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security measures can be implemented to protect a network from threats, and provide examples of each.

A

Measures are required to ensure the security of a network including the use of passwords, biometrics and tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can data be safeguarded from unauthorized access, and what technologies or practices can enhance data security?

A

Data can be protected by strong passwords, firewalls and encryption techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe three methods of communication used in network environments: audio-conferencing, video-conferencing, and web-conferencing.

A

Audio-conferencing, video-conferencing and web-conferencing are methods of communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly