Chapter Six: Computer communications and networking. Flashcards

1
Q

Describe the purpose of an NIC.

A

The NIC is a physical device that generates and receives suitable electrical signals. It can also carry out simple addressing by making use of MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distinguish between a network hub and a network switch.

A

Network hubs are hardware devices that connect many network devise together making them work in a network segment. They have a number of input and output ports which connect to each other. Network switches connect network segments or devices. They can also act as bridges, which connect more than one network, allowing them to function as one network. A switch differs from a hub by transmitting a message only to the device intended instead of to all connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State three ways in which security can be implemented on a wireless access point.

A

Encryption
Hiding their broadcast identities
Allowing access to only certain MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the purpose of a router.

A

A router receives in the form of packets and forwards them to their destinations which is often another router. Routers direct traffic through large networks, notably the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a network bridge?

A

A network bridge connects more than one network, allowing them to function as one network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State three uses for a network server

A

Database server: Stores the co-operate database.
File server: Which stores user files.
Mail server: Which stores emails received and sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the difference between a client-server network and a peer-to-peer network.

A

In a peer-to-peer network, all computers are equal. Each computer serves the needs of the user as well as carrying networking functions. Whereas, in a client-server network, one or more servers provide services to many client machines where the users work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain why bus topologies can be slow.

A

Bus topologies can be slow because there can be many data collisions which slow down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State two advantages of a star network over a bus network.

A

A star topology is robust, so there are fewer problems. A problem with the connection does no affect the whole network. Also, there are fewer data collisions than a bus topology, so the star topology is faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain what is meant by a network protocol.

A

A set of rules that cover data communications is called a protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe two protocols commonly used on the internet.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a data packet?

A

Packets are collections of data forming part of a message. A packet is constructed according to rules laid down by the appropriate protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IP address?

A

An IP address is a 32-bit number. Each group of eight bits is called by an octet. Each octet can stores numbers ranging from 0 to 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a MAC address?

A

MAC means Media Access Control. A MAC address is a unique number stored in each NIC so it can be used to identify a device on a device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify three ways in which a catastrophic data loss can occur.

A

Data loss by deliberate or accidental deletion;
Theft of data which might not even be apparent if copied;
Installation of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What needs to be taken into account when deciding on the frequency of taking network backups?

A

Backups should be done often enough that the business can continue to function as quickly as possible after a data loss incident and that no data is lost that cannot be recreated.

17
Q

What is the difference between a backup and an archive?

A

A partial backup is sometimes enough, where the backup is only of data that has changed since the last backup. The archive flag of a file is set after a backup has been done and it is cleared If the data is changed. This allows automatic partial backups to take place.

18
Q

What does the term ‘Failover’ mean?

A

A failover is when the software detects a potential disaster or abnormality and immediately transfers operations to a duplicate system.

19
Q

Describe how a network authenticates a user.

A

In many systems, the users are members of groups such as finance or personnel. Permission can be assigned separately to an individual, a group or anyone else such as a guest user.

20
Q

State three characteristics of a strong password.

A

Make it long enough.
Include numbers and letters.
Include special characters.

21
Q

State three sensible conditions of an acceptable use policies.

A

Not using the network for bulk mailings or marketing;
Not accessing unauthorised materials;
Not wasting staff time.

22
Q

Explain what a DSL connection is.

A

Digital subscriber line routers are combined with a modem in order to make use of unused bandwidth in the telephone line which connects with internet links at the telephone exchange.

23
Q

What is the purpose of a modem?

A

Modem (Modulator-Demodulator) converts between these signals and allows connection to the internet on the POTS (Plain Old Telephone Service) which is still widespread.

24
Q

Distinguish between lossy and lossless compression.

A

Lossy compression works by removing some of the data from the file. The data is removed cannot be recovered. Lossy compression is used in file formats such as MP3, JPG and MPEG. Whereas lossless compression does not store repeated detail, such as lots of pixels in a photo that includes the sky. It allows the original file to be reconstructed exactly.

25
Q

Explain the importance of file standards when including external files on a web

A

Firstly, it saves space on media and also reduces transmissions times on a network, especially the internet.